INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df98f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577e38c r4:8577e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577e38c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8680 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d74a5000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/0:2:48 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:48 tgid:48 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df925d84 r8:00000002 r7:60000013 r6:df925d8c r5:833e0000 r4:833e0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833e0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df925e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcdb8c r4:85bcd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcdb8c r4:83366a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833e0000 r8:83366a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83366a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83366a00 r8:80287e08 r7:df845e60 r6:83366b00 r5:833e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf925fb0 to 0xdf925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83361fc0 INFO: task kworker/0:2:48 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d897f000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/0:6:3113 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3113 tgid:3113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9ddd84 r8:00000002 r7:60000013 r6:df9ddd8c r5:841c3c00 r4:841c3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531fa40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b778c r4:853b7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b778c r4:844bb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841c3c00 r8:844bb52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bb500 r8:80287e08 r7:df9d9e60 r6:844bb580 r5:841c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d1c500 INFO: task kworker/0:6:3113 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d897f000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/0:7:3116 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:842ca400 r4:842ca400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ca400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b738c r4:853b7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b738c r4:844bb600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842ca400 r8:844bb62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bb600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bb600 r8:80287e08 r7:df9dde60 r6:844bb680 r5:842ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d1cac0 INFO: task kworker/0:7:3116 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d9101000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:7:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:841c0c00 r4:841c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841c0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522b740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443eb8c r4:8443e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443eb8c r4:84785e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841c0c00 r8:84785eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785e80 r8:80287e08 r7:dfa11e60 r6:844bb880 r5:841c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429e500 INFO: task kworker/1:7:3123 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d9101000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:8:3125 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:8385e000 r4:8385e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8385e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8429e940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8385e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529af8c r4:8529ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8529af8c r4:84785d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8385e000 r8:84785d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785d00 r8:80287e08 r7:dfa29e60 r6:844bb900 r5:8385e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429e5c0 INFO: task kworker/1:8:3125 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d97e4000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:9:3127 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:8385b000 r4:8385b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8385b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8385b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bb8c r4:8528b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528bb8c r4:84785b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8385b000 r8:84785bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785b80 r8:80287e08 r7:dfa31e60 r6:844bb980 r5:8385b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429e740 INFO: task kworker/1:9:3127 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d97e4000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:10:3129 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:8385bc00 r4:8385bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8385bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540c440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8385bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85117b8c r4:85117800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85117b8c r4:84785c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8385bc00 r8:84785cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785c80 r8:80287e08 r7:dfa31e60 r6:844bba00 r5:8385bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429eb40 INFO: task kworker/1:10:3129 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d9e4f000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:842d6000 r4:842d6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842d6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ab80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85115f8c r4:85115c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85115f8c r4:84785d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842d6000 r8:84785dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785d80 r8:80287e08 r7:dfa59e60 r6:844bba80 r5:842d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429e9c0 INFO: task kworker/1:11:3131 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: d9e4f000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 INFO: task kworker/1:12:3134 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83a58c00 r4:83a58c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a58c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a58c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b278c r4:853b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b278c r4:84785f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a58c00 r8:84785fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785f80 r8:80287e08 r7:dfa59e60 r6:844bbb00 r5:83a58c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429ed00 INFO: task kworker/1:12:3134 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: da595000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3136 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:8385a400 r4:8385a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8385a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d0140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8385a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c5b8c r4:854c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c5b8c r4:84785c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8385a400 r8:84785c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84785c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84785c00 r8:80287e08 r7:dfa59e60 r6:844bbb80 r5:8385a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429ed40 INFO: task kworker/1:13:3136 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: da595000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3139 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:8387b000 r4:8387b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcc78c r4:85bcc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcc78c r4:844bbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387b000 r8:844bbc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbc00 r8:80287e08 r7:df9dde60 r6:844bbc80 r5:8387b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889100 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: da8a8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3141 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df96dd84 r8:00000002 r7:60000113 r6:df96dd8c r5:83878000 r4:83878000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83878000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df96de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83878000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557938c r4:85579000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8557938c r4:846d4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83878000 r8:846d402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4000 r8:80287e08 r7:dfa81e60 r6:844bbd00 r5:83878000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf96dfb0 to 0xdf96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1100 INFO: task kworker/1:14:3141 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dacc8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000013 r6:dfa95d8c r5:8386a400 r4:8386a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85354e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea829000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ee38c r4:854ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ee38c r4:846d4080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386a400 r8:846d40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4080 r8:80287e08 r7:df96de60 r6:846d4100 r5:8386a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1100 INFO: task kworker/1:15:3142 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dacc8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3143 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000013 r6:dfaa1d8c r5:8386ec00 r4:8386ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542538c r4:85425000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8542538c r4:844bbd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386ec00 r8:844bbdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbd80 r8:80287e08 r7:dfa6de60 r6:846d4180 r5:8386ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889340 INFO: task kworker/0:9:3143 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: daf03000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3145 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:8386e000 r4:8386e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ab7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554f38c r4:8554f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554f38c r4:844bbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386e000 r8:844bbe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbe00 r8:80287e08 r7:dfa6de60 r6:846d4200 r5:8386e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848891c0 INFO: task kworker/0:10:3145 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: daf03000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3147 blocked for more than 450 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:833e6c00 r4:833e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564978c r4:85649400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8564978c r4:846d4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833e6c00 r8:846d42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4280 r8:80287e08 r7:df96de60 r6:846d4300 r5:833e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1380 INFO: task kworker/1:16:3147 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: db728000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3150 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:845b8c00 r4:845b8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:845b8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572b880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:845b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577ef8c r4:8577ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577ef8c r4:844bbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845b8c00 r8:844bbeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbe80 r8:80287e08 r7:dfa6de60 r6:846d4380 r5:845b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848893c0 INFO: task kworker/0:11:3150 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: db728000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3152 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83a6b000 r4:83a6b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a6b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571b9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559fb8c r4:8559f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559fb8c r4:846d4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a6b000 r8:846d442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4400 r8:80287e08 r7:dfab1e60 r6:846d4480 r5:83a6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c5fb0 to 0xdf9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1ac0 INFO: task kworker/1:17:3152 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: db728000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3154 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83a69800 r4:83a69800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a69800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f69c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a69800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559f38c r4:8559f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559f38c r4:846d4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a69800 r8:846d452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4500 r8:80287e08 r7:df9c5e60 r6:846d4580 r5:83a69800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1c00 INFO: task kworker/1:18:3154 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dba9e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:83a6d400 r4:83a6d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a6d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec91d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae2b8c r4:85ae2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae2b8c r4:846d4600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a6d400 r8:846d462c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4600 r8:80287e08 r7:df9c5e60 r6:846d4680 r5:83a6d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1d00 INFO: task kworker/1:19:3156 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dbccb000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3158 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:83ca3000 r4:83ca3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ca3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ca3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567b38c r4:8567b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567b38c r4:846d4700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ca3000 r8:846d472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4700 r8:80287e08 r7:dfacde60 r6:846d4780 r5:83ca3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1ec0 INFO: task kworker/1:20:3158 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dbeec000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:83ca6c00 r4:83ca6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ca6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ea80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ca6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaead000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d4f8c r4:856d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d4f8c r4:846d4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ca6c00 r8:846d482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4800 r8:80287e08 r7:dfacde60 r6:846d4880 r5:83ca6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429ef40 INFO: task kworker/1:21:3160 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dc024000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83ca0c00 r4:83ca0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ca0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b05240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ca0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591438c r4:85914000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591438c r4:846d4900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ca0c00 r8:846d492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4900 r8:80287e08 r7:dfacde60 r6:846d4980 r5:83ca0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8491a880 INFO: task kworker/1:22:3162 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dc024000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3164 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:84788000 r4:84788000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84788000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fc740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84788000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec533000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ce78c r4:858ce400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858ce78c r4:844bbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84788000 r8:844bbf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbf00 r8:80287e08 r7:dfa6de60 r6:846d4a00 r5:84788000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889780 INFO: task kworker/0:12:3164 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dc71e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3166 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb0dd84 r8:00000002 r7:60000013 r6:dfb0dd8c r5:84789800 r4:84789800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84789800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541d980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84789800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579878c r4:85798400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579878c r4:844bbf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84789800 r8:844bbfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bbf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bbf80 r8:80287e08 r7:dfa6de60 r6:846d4a80 r5:84789800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848898c0 INFO: task kworker/0:13:3166 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dc71e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3168 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000013 r6:dfb21d8c r5:8478b000 r4:8478b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525f440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8478b000 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85602f8c r4:85602c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85602f8c r4:844bb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478b000 r8:844bb02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bb000 r8:80287e08 r7:dfa6de60 r6:846d4b00 r5:8478b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889980 INFO: task kworker/0:14:3168 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dcc2a000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3170 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:8478bc00 r4:8478bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8478bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcc38c r4:85bcc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcc38c r4:844bb100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478bc00 r8:844bb12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:844bb100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844bb100 r8:80287e08 r7:dfa6de60 r6:846d4c00 r5:8478bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889b00 INFO: task kworker/0:15:3170 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dcd3e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3173 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84788c00 r4:84788c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84788c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b33b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85917f8c r4:85917c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85917f8c r4:846d4b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84788c00 r8:846d4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4b80 r8:80287e08 r7:dfacde60 r6:846d4c80 r5:84788c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3780 INFO: task kworker/1:23:3173 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dcd3e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:8478c800 r4:8478c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b05200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae638c r4:85ae6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae638c r4:846d4d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478c800 r8:846d4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4d00 r8:80287e08 r7:dfb25e60 r6:846d4d80 r5:8478c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3780 INFO: task kworker/1:24:3175 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dd0b9000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3178 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3178 tgid:3178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:8478d400 r4:8478d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b33200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847bbb8c r4:847bb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847bbb8c r4:846d4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478d400 r8:846d4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4e00 r8:80287e08 r7:dfb25e60 r6:846d4e80 r5:8478d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3a40 INFO: task kworker/1:25:3178 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dd0b9000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3179 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:8478e000 r4:8478e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed067000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa4f8c r4:84aa4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa4f8c r4:846d4f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478e000 r8:846d4f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846d4f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d4f00 r8:80287e08 r7:dfaede60 r6:846d4f80 r5:8478e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3b00 INFO: task kworker/1:26:3179 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dd8ef000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:8478ec00 r4:8478ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f159000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed059000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa538c r4:84aa5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa538c r4:844cb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478ec00 r8:844cb02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb000 r8:80287e08 r7:dfb45e60 r6:844cb080 r5:8478ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3b00 INFO: task kworker/1:27:3181 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dd8ef000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3183 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:8387bc00 r4:8387bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8387bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f153000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa5f8c r4:84aa5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa5f8c r4:844cb100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387bc00 r8:844cb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb100 r8:80287e08 r7:dfb4de60 r6:844bb080 r5:8387bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3f40 INFO: task kworker/1:28:3183 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ddc1c000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:84192400 r4:84192400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84192400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84192400 r7:00000000 r6:83018200 r5:00001000 r4:7f157000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa578c r4:84aa5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa578c r4:844cb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84192400 r8:844cb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb180 r8:80287e08 r7:dfb65e60 r6:844bb180 r5:84192400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841f3380 INFO: task kworker/1:29:3185 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dde31000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000013 r6:dfb8dd8c r5:83a63c00 r4:83a63c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a63c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa5b8c r4:84aa5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa5b8c r4:844cb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a63c00 r8:844cb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb200 r8:80287e08 r7:dfb65e60 r6:84280580 r5:83a63c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888080 INFO: task kworker/1:30:3188 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de164000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:83a62400 r4:83a62400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83a62400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1f9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c41f8c r4:85c41c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c41f8c r4:844cb300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83a62400 r8:844cb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb300 r8:80287e08 r7:dfb65e60 r6:84280500 r5:83a62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888080 INFO: task kworker/1:31:3189 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de351000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3191 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:8387ec00 r4:8387ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8387ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed035000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa638c r4:84aa6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa638c r4:844cb380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387ec00 r8:844cb3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb380 r8:80287e08 r7:dfb91e60 r6:84280600 r5:8387ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888080 INFO: task kworker/1:32:3191 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de5c3000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:849f0000 r4:849f0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1fb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec36d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4238c r4:85c42000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4238c r4:844cb400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f0000 r8:844cb42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb400 r8:80287e08 r7:dfb91e60 r6:84280400 r5:849f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848881c0 INFO: task kworker/1:33:3192 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de5c3000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:849f1800 r4:849f1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa438c r4:84aa4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa438c r4:844cb480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f1800 r8:844cb4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb480 r8:80287e08 r7:dfb91e60 r6:84280f80 r5:849f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888300 INFO: task kworker/1:34:3194 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de984000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:849f0c00 r4:849f0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa478c r4:84aa4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa478c r4:844cb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f0c00 r8:844cb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb500 r8:80287e08 r7:dfbb1e60 r6:84280780 r5:849f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848885c0 INFO: task kworker/1:35:3196 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: de984000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:849f3000 r4:849f3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd62c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f347000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed39f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aae78c r4:84aae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aae78c r4:844cb580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f3000 r8:844cb5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb580 r8:80287e08 r7:dfbb1e60 r6:846f8e80 r5:849f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848887c0 INFO: task kworker/1:36:3199 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dec4e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3200 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:849f3c00 r4:849f3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa678c r4:84aa6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa678c r4:844cb600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f3c00 r8:844cb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb600 r8:80287e08 r7:dfbcde60 r6:847ae000 r5:849f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848889c0 INFO: task kworker/1:37:3200 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: df066000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:849f4800 r4:849f4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b07b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f19f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cae78c r4:85cae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cae78c r4:844cb680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f4800 r8:844cb6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb680 r8:80287e08 r7:dfbcde60 r6:847ae080 r5:849f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848889c0 INFO: task kworker/1:38:3203 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: df1da000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3204 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:849f5400 r4:849f5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bccb8c r4:85bcc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bccb8c r4:847ae100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f5400 r8:847ae12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ae100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae100 r8:80287e08 r7:dfa6de60 r6:847ae180 r5:849f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8488da00 INFO: task kworker/0:16:3204 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: df692000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3207 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:83ca3c00 r4:83ca3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ca3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ca3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcd38c r4:85bcd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcd38c r4:847ae200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ca3c00 r8:847ae22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ae200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae200 r8:80287e08 r7:dfbb9e60 r6:844cb700 r5:83ca3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8488dc00 INFO: task kworker/0:17:3207 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: df7c7000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84878000 r4:84878000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84878000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84878000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec50d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcf38c r4:85bcf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcf38c r4:847ae280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84878000 r8:847ae2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ae280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae280 r8:80287e08 r7:dfbf9e60 r6:844cb780 r5:84878000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8488dd00 INFO: task kworker/0:18:3208 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: df7c7000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000013 r6:dfc05d8c r5:84878c00 r4:84878c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84878c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b41840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bcdf8c r4:85bcdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bcdf8c r4:847ae300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84878c00 r8:847ae32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ae300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ae300 r8:80287e08 r7:dfc01e60 r6:844cb800 r5:84878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8488dd00 INFO: task kworker/0:19:3210 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: dfbb9000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeab7dd28 to 0xeab7dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3214 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84879800 r4:84879800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84879800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b57040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84879800 r7:00000000 r6:83018200 r5:00001000 r4:7f2a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed83f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9ef8c r4:85d9ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9ef8c r4:844cb980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84879800 r8:844cb9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cb980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cb980 r8:80287e08 r7:dfbcde60 r6:844cba00 r5:84879800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889440 INFO: task kworker/1:40:3214 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e0329000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r7:dddced80 r6:83018000 r5:8527278c r4:85249280 Exception stack(0xeab7dfb0 to 0xeab7dff8) INFO: task kworker/1:41:3216 blocked for more than 451 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f349000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aadf8c r4:84aadc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487b000 r8:844cbaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cba80 r8:80287e08 r7:dfbcde60 r6:844cbb00 r5:8487b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888f80 INFO: task kworker/1:41:3216 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e0329000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:42:3219 blocked for more than 451 seconds. r5:8487d400 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a8c38c r4:84a8c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:844cbb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cbb80 r8:80287e08 r7:dfbcde60 r6:844cbc00 r5:8487d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf999fb0 to 0xdf999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4040 INFO: task kworker/1:42:3219 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e0329000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed365000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aad38c r4:84aad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:844cbc80 r8:80287e08 r7:df999e60 r6:847ae380 r5:849f2400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab7dd28 to 0xeab7dd70) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3223 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:849f6000 r4:849f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488d200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f341000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6ff8c r4:84a6fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6ff8c r4:844cbd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f6000 r8:844cbd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cbd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cbd00 r8:80287e08 r7:df999e60 r6:847ae400 r5:849f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4380 INFO: task kworker/1:44:3223 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e0aa8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab8b000 r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3226 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:849f6c00 r4:849f6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f33f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6fb8c r4:84a6f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6fb8c r4:844cbd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f6c00 r8:844cbdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cbd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cbd80 r8:80287e08 r7:df9f9e60 r6:847ae480 r5:849f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac44c0 INFO: task kworker/1:45:3226 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6f78c r4:84a6f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3229 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc31d84 r8:00000002 r7:60000113 r6:dfc31d8c r5:84929800 r4:84929800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84929800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4a80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6f38c r4:84a6f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r5:8527278c r4:85272400 r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85db238c r4:85db2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8492a400 r8:844cbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:844cbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:844cbf00 r8:80287e08 r7:dfc31e60 r6:847ae600 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc35fb0 to 0xdfc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4780 INFO: task kworker/1:48:3230 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e11cf000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3232 blocked for more than 451 seconds. r4:84928c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r9:83018205 r8:84928c00 r7:00000000 r6:83018200 r5:00001000 r4:7f337000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6eb8c r4:84a6e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84928c00 r8:844cbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4940 INFO: task kworker/1:49:3232 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e1b1a000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85249280 Exception stack(0xeab7dfb0 to 0xeab7dff8) task:kworker/1:50 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8492b000 r7:00000000 r6:83018200 r5:00001000 r4:7f339000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6ef8c r4:84a6ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8488e000 r8:80287e08 r7:dfc3de60 r6:847ae700 r5:8492b000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:51 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:8487c800 r4:8487c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487c800 r7:00000000 r6:83018200 r5:00001000 r4:7f335000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6e78c r4:84a6e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6e78c r4:8488e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487c800 r8:8488e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488e080 r8:80287e08 r7:dfc3de60 r6:8488e100 r5:8487c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4b80 INFO: task kworker/1:51:3236 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e20a0000 eab75000 00000001 80239b98 7f2c3000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r5:8527278c r4:85272400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243540 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4f40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6e38c r4:84a6e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6e38c r4:8488e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487ec00 r8:8488e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488e180 r8:80287e08 r7:dfc3de60 r6:8488e200 r5:8487ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac4dc0 INFO: task kworker/1:52:3239 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e2596000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3241 blocked for more than 451 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84a6df8c r4:8488e280 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8488d480 INFO: task kworker/1:53:3241 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e2596000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8487e000 r7:00000000 r6:83018200 r5:00001000 r4:7f421000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d73b8c r4:85d73800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: e2a7b000 eab75000 00000001 80239b98 7f2c3000 00000001 r4:eab7ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3246 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:845c0000 r4:845c0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:845c0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e8a140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f425000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8485838c r4:84858000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8485838c r4:8488e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845c0000 r8:8488e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488e480 r8:80287e08 r7:dfc55e60 r6:8488e500 r5:845c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9d280 INFO: task kworker/1:55:3246 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e2a7b000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r5:8527278c r4:85272400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:845c0c00 r4:845c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d73f8c r4:85d73c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d73f8c r4:8488e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845c0c00 r8:8488e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488e580 r8:80287e08 r7:dfc55e60 r6:8488e600 r5:845c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9d540 INFO: task kworker/1:56:3247 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e2f62000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 Exception stack(0xeab7dfb0 to 0xeab7dff8) INFO: task kworker/1:57:3250 blocked for more than 452 seconds. r5:845c1800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:58:3252 blocked for more than 452 seconds. r4:845c2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r9:83018205 r8:845c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f41f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8488e780 r8:80287e08 r7:dfc61e60 r6:8488e800 r5:845c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9d200 INFO: task kworker/1:58:3252 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e3635000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 Exception stack(0xeab7dfb0 to 0xeab7dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:845c4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d72f8c r4:85d72c00 r7:ddde2d80 r6:83018200 r5:85d72f8c r4:8488e900 r10:00000000 r9:8488e900 r8:80287e08 r7:dfc61e60 r6:8488e980 r5:845c4800 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:845c3c00 r8:8488e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488e880 r8:80287e08 r7:dfc71e60 r6:8488ea00 r5:845c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9db00 INFO: task kworker/1:60:3256 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e3a54000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3258 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:845c6000 r4:845c6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:845c6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e30e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f419000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d72b8c r4:85d72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d72b8c r4:8488ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845c6000 r8:8488eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ea80 r8:80287e08 r7:dfc75e60 r6:8488eb00 r5:845c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9dd80 INFO: task kworker/1:61:3258 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e3a54000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8527278c r4:85272400 r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3259 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:845c6c00 r4:845c6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:845c6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7a2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:845c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f4b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e6a38c r4:85e6a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e6a38c r4:8488eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:845c6c00 r8:8488ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488eb80 r8:80287e08 r7:dfc7de60 r6:8488ec00 r5:845c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9d740 INFO: task kworker/1:62:3259 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e3ddf000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8527278c r4:85272400 r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:63 state:D stack:0 pid:3261 tgid:3261 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc8de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ac000 INFO: task kworker/1:63:3261 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e3ddf000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3264 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc45d84 r8:00000002 r7:60000013 r6:dfc45d8c r5:845c3000 r4:845c3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:845c3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb80f000 r7:dddced80 r6:83018000 r5:85bce78c r4:847ae780 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:3265 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfca1d84 r8:00000002 r7:60000013 r6:dfca1d8c r5:8478a400 r4:8478a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ddb300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478a400 r7:00000000 r6:83018200 r5:00001000 r4:7f4bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507378c r4:85073400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8507378c r4:8488ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478a400 r8:8488ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8488ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8488ee00 r8:80287e08 r7:dfc89e60 r6:8488ee80 r5:8478a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:64:3265 is blocked on a mutex likely owned by task kworker/0:294:4180. dd20: e422d000 eab75000 00000001 80239b98 7f2c3000 00000001 r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243540 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:847adc80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e4813000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:84880000 r4:84880000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84880000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84880000 r7:00000000 r6:83018200 r5:00001000 r4:7f559000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:847ac5c0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r5:8527278c r4:85272400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r5:00001000 r4:ecf23000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e5078000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3273 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84882400 r4:84882400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84882400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3278 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfce5d84 r8:00000002 r7:60000113 r6:dfce5d8c r5:84880c00 r4:84880c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84880c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85f0238c r4:85f02000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3281 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84a9b400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9c3c0 INFO: task kworker/1:69:3281 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e536e000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 r5:8527278c r4:85272400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84885400 r7:00000000 r6:83018200 r5:00001000 r4:7f4bd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243540 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed82b000 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a9c240 INFO: task kworker/1:71:3285 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e5e49000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3287 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:61c88647 r9:84886c00 r8:84a9b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r4:82ac21e4 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab7dfb0 to 0xeab7dff8) Workqueue: events bpf_prog_free_deferred [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 dd20: e63d8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:74 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:74:3291 is blocked on a mutex likely owned by task kworker/0:294:4180. r4:00000000 r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:84a9ba00 r8:80287e08 r7:dfcc5e60 r6:84a9ba80 r5:848f8c00 r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e63d8000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:76:3296 blocked for more than 452 seconds. r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:eab8b000 r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:61c88647 r9:848fa400 r8:84a9bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e6b00000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3299 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:848fb000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972d80 Exception stack(0xdfd01fb0 to 0xdfd01ff8) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:79:3300 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:8492d400 r4:8492d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8492d400 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f03b8c r4:85f03800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f03b8c r4:84a9be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492d400 r8:84a9be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9be00 r8:80287e08 r7:dfcfde60 r6:847ae900 r5:8492d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a3c000 INFO: task kworker/1:79:3300 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r5:00001000 r4:eab8b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:80:3303 blocked for more than 452 seconds. r4:8492e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r9:83018205 r8:8492e000 r7:00000000 r6:83018200 r5:00001000 r4:7f567000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84a3c300 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:00001000 r4:eab8b000 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3304 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3304 tgid:3304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:8492c800 r4:8492c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8492c800 r7:00000000 r6:83018200 r5:00001000 r4:7f56f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0538c r4:85f05000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0538c r4:84a9bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492c800 r8:84a9bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a9bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a9bf00 r8:80287e08 r7:dfd15e60 r6:847aea00 r5:8492c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a3c300 INFO: task kworker/1:81:3304 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e75e5000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3307 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3307 tgid:3307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:83878c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed977000 r5:85f0478c r4:85f04400 r10:00000000 r9:84a9bf80 r8:80287e08 r7:dfd19e60 r6:847aea80 r5:83878c00 r4:84a3c200 Workqueue: events bpf_prog_free_deferred dd20: e75e5000 eab75000 00000001 80239b98 7f2c3000 00000001 r4:eab7ddc0 r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:3308 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:3308 tgid:3308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:848fbc00 r4:848fbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c340 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848fbc00 r8:84acb02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:85243540 task:kworker/1:84 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r5:00001000 r4:ed9d3000 r7:ddde2d80 r6:83018200 r5:85f04f8c r4:84acb100 9fa0: 00000000 00000000 00000000 00000000 r4:84a3c540 INFO: task kworker/1:84:3311 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e7d7c000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3313 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd2dd84 r8:00000002 r7:60000113 r6:dfd2dd8c r5:848fd400 r4:848fd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f571000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0578c r4:85f05400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0578c r4:84acb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fd400 r8:84acb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb200 r8:80287e08 r7:dfd19e60 r6:84acb280 r5:848fd400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3315 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd31d84 r8:00000002 r7:60000113 r6:dfd31d8c r5:848fe000 r4:848fe000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fe000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f573000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f05b8c r4:85f05800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f05b8c r4:84acb300 r10:61c88647 r9:848fe000 r8:84acb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: e80f9000 eab75000 00000001 80239b98 7f2c3000 00000001 r4:00000000 r5:00001000 r4:eab8b000 r4:85249280 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:848c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f575000 r5:85f05f8c r4:85f05c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f05f8c r4:84acb400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0000 r8:84acb42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb400 r8:80287e08 r7:dfd31e60 r6:84acb480 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a3ca40 INFO: task kworker/1:87:3317 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e83d6000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3319 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3319 tgid:3319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd39d84 r8:00000002 r7:60000113 r6:dfd39d8c r5:848c1800 r4:848c1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f577000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0638c r4:85f06000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0638c r4:84acb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c1800 r8:84acb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb500 r8:80287e08 r7:dfd35e60 r6:84acb580 r5:848c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a3cdc0 INFO: task kworker/1:88:3319 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e86f9000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3321 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3321 tgid:3321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:848c3000 r4:848c3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2c9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f579000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0678c r4:85f06400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0678c r4:84acb600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3000 r8:84acb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb600 r8:80287e08 r7:dfd39e60 r6:84acb680 r5:848c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:90 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2cb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f06f8c r4:85f06c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f06f8c r4:84acb700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0c00 r8:84acb72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb700 r8:80287e08 r7:dfd3de60 r6:84acb780 r5:848c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ad840 INFO: task kworker/1:90:3322 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e8a23000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:eab8b000 Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243540 task:kworker/1:91 state:D stack:0 pid:3325 tgid:3325 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84acb800 r8:80287e08 r7:dfd41e60 r6:84acb880 r5:848c3c00 r4:84a6b040 Workqueue: events bpf_prog_free_deferred dd20: e8e0d000 eab75000 00000001 80239b98 7f2c3000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3328 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd49d84 r8:00000002 r7:60000113 r6:dfd49d8c r5:848c4800 r4:848c4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2cc80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f57f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0738c r4:85f07000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0738c r4:84acb900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:84acb92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acb900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acb900 r8:80287e08 r7:dfd41e60 r6:84acb980 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6b280 INFO: task kworker/1:92:3328 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e8e0d000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3329 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3329 tgid:3329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:848c5400 r4:848c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r5:00001000 r4:edac3000 r7:ddde2d80 r6:83018200 r5:85f0778c r4:84acba00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:00001000 r4:eab8b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:94:3332 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:94 state:D stack:0 pid:3332 tgid:3332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd51d84 r8:00000002 r7:60000113 r6:dfd51d8c r5:848c6000 r4:848c6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2cfc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f587000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edaf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0838c r4:85f08000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0838c r4:84acbb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6000 r8:84acbb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acbb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acbb00 r8:80287e08 r7:dfd4de60 r6:84acbb80 r5:848c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd51fb0 to 0xdfd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6b3c0 INFO: task kworker/1:94:3332 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e95df000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3333 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3333 tgid:3333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd55d84 r8:00000002 r7:60000113 r6:dfd55d8c r5:848c6c00 r4:848c6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b081c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f58b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f08b8c r4:85f08800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f08b8c r4:84acbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6c00 r8:84acbc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acbc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acbc00 r8:80287e08 r7:dfd51e60 r6:84acbc80 r5:848c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6b700 INFO: task kworker/1:95:3333 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e98f7000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:3335 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:96 state:D stack:0 pid:3335 tgid:3335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd45d84 r8:00000002 r7:60000113 r6:dfd45d8c r5:848c2400 r4:848c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b08000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f589000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0878c r4:85f08400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0878c r4:84acbd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c2400 r8:84acbd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acbd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acbd00 r8:80287e08 r7:dfd51e60 r6:84acbd80 r5:848c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd45fb0 to 0xdfd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6b700 INFO: task kworker/1:96:3335 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e9b81000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:3337 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:3337 tgid:3337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd69d84 r8:00000002 r7:60000113 r6:dfd69d8c r5:848fec00 r4:848fec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848fec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd69e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b085c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f593000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f09b8c r4:85f09800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f09b8c r4:84acbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848fec00 r8:84acbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acbe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acbe00 r8:80287e08 r7:dfd51e60 r6:84acbe80 r5:848fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd69fb0 to 0xdfd69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6bac0 INFO: task kworker/1:97:3337 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: e9b81000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3339 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3339 tgid:3339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:848c8c00 r4:848c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84972ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f585000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edae9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f07f8c r4:85f07c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f07f8c r4:84acbf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c8c00 r8:84acbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acbf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acbf00 r8:80287e08 r7:dfd69e60 r6:84acbf80 r5:848c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6b700 INFO: task kworker/1:98:3339 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ea0bd000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:99:3341 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:99 state:D stack:0 pid:3341 tgid:3341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:848c9800 r4:848c9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b084c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f591000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0978c r4:85f09400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0978c r4:84b1b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c9800 r8:84b1b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b1b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b1b000 r8:80287e08 r7:dfd69e60 r6:84b1b080 r5:848c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a6bcc0 INFO: task kworker/1:99:3341 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ea592000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:100:3344 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:100 state:D stack:0 pid:3344 tgid:3344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd85d84 r8:00000002 r7:60000113 r6:dfd85d8c r5:848ca400 r4:848ca400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ca400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b086c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f595000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f09f8c r4:85f09c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f09f8c r4:84b1b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ca400 r8:84b1b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b1b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b1b100 r8:80287e08 r7:dfd75e60 r6:84b1b180 r5:848ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd85fb0 to 0xdfd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1e0c0 INFO: task kworker/1:100:3344 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ea592000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3346 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3346 tgid:3346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd99d84 r8:00000002 r7:60000113 r6:dfd99d8c r5:848cb000 r4:848cb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848cb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b083c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f58f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0938c r4:85f09000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0938c r4:84b1b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848cb000 r8:84b1b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b1b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b1b200 r8:80287e08 r7:dfd85e60 r6:84b1b280 r5:848cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd99fb0 to 0xdfd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1e300 INFO: task kworker/1:101:3346 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ea592000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3347 blocked for more than 452 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:102 state:D stack:0 pid:3347 tgid:3347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:848cbc00 r4:848cbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848cbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a39440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f5db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed617000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85f0a38c r4:85f0a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85f0a38c r4:84b1b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848cbc00 r8:84b1b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b1b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b1b300 r8:80287e08 r7:dfd85e60 r6:84b1b380 r5:848cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1e180 INFO: task kworker/1:102:3347 is blocked on a mutex likely owned by task kworker/0:294:4180. task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84935400 r8:80200be4 r7:eab7dd5c r6:ffffffff r5:84935400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab7dd28 to 0xeab7dd70) dd20: ea592000 eab75000 00000001 80239b98 7f2c3000 00000001 dd40: 82ac15a0 7f2c3000 eab75000 8280c928 82ac21c4 eab7dda4 eab7dda8 eab7dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab7ddc0 r5:eab7de08 r4:eab7ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243780 r5:00001000 r4:eab8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527278c r4:85272400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527278c r4:85249280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:852492ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249280 r8:80287e08 r7:eab71e60 r6:85249300 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243540 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb5e08 r5:00001000 r4:ed679000 r7:ddde2d80 r6:83018200 r5:85f0a78c r4:84b1b500 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:294 state:R running task stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296f8c r4:85296c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85296f8c r4:851b3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85170000 r8:851b332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b3300 r8:80287e08 r7:ea815e60 r6:851b3380 r5:85170000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b5fb0 to 0xea9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850b9180 INFO: task kworker/1:238:4045 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 7f44d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:4141 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85188c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85188c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c80c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85188c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443e78c r4:8443e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443e78c r4:851ec480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85188c00 r8:851ec4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ec480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ec480 r8:80287e08 r7:ea9b5e60 r6:851ec500 r5:85188c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8522b080 INFO: task kworker/1:241:4141 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 7f772000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527378c r4:85273400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527378c r4:85249380 r10:61c88647 r9:84936c00 r8:852493ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 7fa19000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 INFO: task kworker/0:297:4186 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 7fac4000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 900f0013 ffffffff r5:900f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4188 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527338c r4:85273000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4191 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa29d84 r8:00000002 r7:60000013 r6:eaa29d8c r5:84a93000 r4:84a93000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a93000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a93000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85273b8c r4:85273800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85273b8c r4:85249780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a93000 r8:852497ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249780 r8:80287e08 r7:eab89e60 r6:85249800 r5:84a93000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4193 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:84a93c00 r4:84a93c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a93c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e040f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527c38c r4:8527c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527c38c r4:85249880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a93c00 r8:852498ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249880 r8:80287e08 r7:eaa29e60 r6:85249900 r5:84a93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f100 INFO: task kworker/0:300:4193 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 80557000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 r4:82ac21e4 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4195 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba1d84 r8:00000002 r7:60000113 r6:eaba1d8c r5:84a94800 r4:84a94800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a94800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a94800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0395000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85273f8c r4:85273c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85273f8c r4:85249980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a94800 r8:852499ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249980 r8:80287e08 r7:eab9de60 r6:85249a00 r5:84a94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:301:4195 is blocked on a mutex likely owned by task kworker/0:296:4183. dd20: 80557000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 r5:85272b8c r4:85272800 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a95400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0437000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527c78c r4:8527c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527c78c r4:85249a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a95400 r8:85249aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249a80 r8:80287e08 r7:eab9de60 r6:85249b00 r5:84a95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f480 INFO: task kworker/0:302:4197 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 80b2c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4199 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a96000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527cb8c r4:8527c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527cb8c r4:85249b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a96000 r8:85249bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249b80 r8:80287e08 r7:eaba5e60 r6:85249c00 r5:84a96000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524f580 INFO: task kworker/0:303:4199 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 80b2c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabadd84 r8:00000002 r7:60000113 r6:eabadd8c r5:84a96c00 r4:84a96c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a96c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524f940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527cf8c r4:8527cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527cf8c r4:85249c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a96c00 r8:85249cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249c80 r8:80287e08 r7:eaba9e60 r6:85249d00 r5:84a96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 80eee000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e065f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8527d38c r4:85249d80 r4:85249d80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4205 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:84936000 r4:84936000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84936000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524fb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84936000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527d78c r4:8527d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527d78c r4:85249e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84936000 r8:85249eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249e80 r8:80287e08 r7:eabb1e60 r6:85249f00 r5:84936000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: dd20: 8107e000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524fd80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527db8c r4:85249f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85208000 r8:85249fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249f80 r8:80287e08 r7:eabb5e60 r6:8525c000 r5:85208000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524fb80 INFO: task kworker/0:307:4208 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 81884000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4209 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4209 tgid:4209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:85208c00 r4:85208c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85208c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8429e640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527df8c r4:8527dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527df8c r4:8525c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85208c00 r8:8525c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c080 r8:80287e08 r7:eabb9e60 r6:8525c100 r5:85208c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8524fb80 INFO: task kworker/0:308:4209 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 81884000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85209800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e38c r4:8527e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527e38c r4:8525c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85209800 r8:8525c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c180 r8:80287e08 r7:eabbde60 r6:8525c200 r5:85209800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243d40 INFO: task kworker/0:309:4212 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 81e1e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4213 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:8520a400 r4:8520a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520a400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea80b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e78c r4:8527e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527e78c r4:8525c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520a400 r8:8525c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c280 r8:80287e08 r7:eabc1e60 r6:8525c300 r5:8520a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265000 INFO: task kworker/0:310:4213 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 81e1e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4216 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc9d84 r8:00000002 r7:60000013 r6:eabc9d8c r5:8520b000 r4:8520b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852651c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea835000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527eb8c r4:8527e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527eb8c r4:8525c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520b000 r8:8525c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c380 r8:80287e08 r7:eabc5e60 r6:8525c400 r5:8520b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265300 INFO: task kworker/0:311:4216 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8220f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4218 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ef8c r4:8527ec00 r7:dddced80 r6:83018000 r5:8527ef8c r4:8525c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r4:85249480 dfa0: 00000000 00000000 00000000 00000000 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4219 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea991d84 r8:00000002 r7:60000013 r6:ea991d8c r5:8520c800 r4:8520c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea85f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527f38c r4:8527f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527f38c r4:8525c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520c800 r8:8525c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c580 r8:80287e08 r7:eabd1e60 r6:8525c600 r5:8520c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265340 INFO: task kworker/0:313:4219 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82395000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4221 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000113 r6:eabd9d8c r5:8520e000 r4:8520e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852658c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527f78c r4:8527f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527f78c r4:8525c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520e000 r8:8525c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c680 r8:80287e08 r7:ea991e60 r6:8525c700 r5:8520e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd9fb0 to 0xeabd9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82661000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 INFO: task kworker/0:315:4222 blocked for more than 453 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852659c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527fb8c r4:8527f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527fb8c r4:8525c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520ec00 r8:8525c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c780 r8:80287e08 r7:eabd9e60 r6:8525c800 r5:8520ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265500 INFO: task kworker/0:315:4222 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82661000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4225 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000013 r6:eabe1d8c r5:842e9800 r4:842e9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842e9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ff8c r4:8527fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527ff8c r4:8525c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842e9800 r8:8525c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c880 r8:80287e08 r7:eabdde60 r6:8525c900 r5:842e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265940 INFO: task kworker/0:316:4225 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82936000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4226 blocked for more than 453 seconds. task:kworker/0:317 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:842e8000 r4:842e8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842e8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288b8c r4:85288800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85288b8c r4:8525c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842e8000 r8:8525c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525c980 r8:80287e08 r7:eabe1e60 r6:8525ca00 r5:842e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265d00 INFO: task kworker/0:317:4226 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82da8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4229 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:842eb000 r4:842eb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842eb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85265dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528838c r4:85288000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528838c r4:8525ca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842eb000 r8:8525caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ca80 r8:80287e08 r7:eabe5e60 r6:8525cb00 r5:842eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85265d80 INFO: task kworker/0:318:4229 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82e32000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4231 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:842ea400 r4:842ea400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ea400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522bd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528878c r4:85288400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528878c r4:8525cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842ea400 r8:8525cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cb80 r8:80287e08 r7:eabe5e60 r6:8525cc00 r5:842ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad080 INFO: task kworker/0:319:4231 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 82e32000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:320:4234 blocked for more than 453 seconds. r10:8291a684 r9:eabf9d84 r8:00000002 r7:60000113 r6:eabf9d8c r5:8518c800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85288f8c r4:85288c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85288f8c r4:8525cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518c800 r8:8525ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cc80 r8:80287e08 r7:eabe5e60 r6:851ec700 r5:8518c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf9fb0 to 0xeabf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad300 INFO: task kworker/0:320:4234 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 83481000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4235 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000013 r6:eabfdd8c r5:8518e000 r4:8518e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528938c r4:85289000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528938c r4:8525cd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518e000 r8:8525cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cd00 r8:80287e08 r7:eabf9e60 r6:851ec780 r5:8518e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad180 INFO: task kworker/0:321:4235 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8355a000 eab7b000 00000001 80239b98 7f2c5000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 r5:85272b8c r4:85272800 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4237 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:8518ec00 r4:8518ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a38c r4:8528a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528a38c r4:8525cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa59000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528978c r4:85289400 r10:61c88647 r9:842ebc00 r8:8525ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8525ce00 r8:80287e08 r7:eac05e60 r6:8525ce80 r5:842ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad280 INFO: task kworker/0:323:4238 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 83b99000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4241 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:842ec800 r4:842ec800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85289b8c r4:85289800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85289b8c r4:8525cf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842ec800 r8:8525cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525cf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525cf00 r8:80287e08 r7:eac05e60 r6:8525cf80 r5:842ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac01fb0 to 0xeac01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad540 INFO: task kworker/0:324:4241 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 83d79000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4242 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:842ed400 r4:842ed400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ed400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ad780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85289f8c r4:85289c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85289f8c r4:852b5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842ed400 r8:852b502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5000 r8:80287e08 r7:eac05e60 r6:852b5080 r5:842ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ad8c0 INFO: task kworker/0:325:4242 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 83d79000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4245 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:85190000 r4:85190000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85190000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852adac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85190000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528a78c r4:8528a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528a78c r4:852b5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85190000 r8:852b512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5100 r8:80287e08 r7:eac05e60 r6:851ec880 r5:85190000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ada40 INFO: task kworker/0:326:4245 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84126000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4247 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac21d84 r8:00000002 r7:60000013 r6:eac21d8c r5:85191800 r4:85191800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85191800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8429e880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85191800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528b78c r4:8528b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528b78c r4:852b5180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85191800 r8:852b51ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5180 r8:80287e08 r7:eac19e60 r6:851ec900 r5:85191800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ada80 INFO: task kworker/0:327:4247 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84849000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4249 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac29d84 r8:00000002 r7:60000013 r6:eac29d8c r5:85193000 r4:85193000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85193000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852adb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528ab8c r4:8528a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528ab8c r4:852b5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193000 r8:852b522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5200 r8:80287e08 r7:eac21e60 r6:851ec980 r5:85193000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ada80 INFO: task kworker/0:328:4249 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84849000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4250 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:85194800 r4:85194800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85194800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852add00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85194800 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528af8c r4:8528ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528af8c r4:852b5280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85194800 r8:852b52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5280 r8:80287e08 r7:eac21e60 r6:851eca00 r5:85194800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852adc00 INFO: task kworker/0:329:4250 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84b36000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4252 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:4252 tgid:4252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac35d84 r8:00000002 r7:60000013 r6:eac35d8c r5:85192400 r4:85192400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85192400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852addc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85192400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528b38c r4:8528b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528b38c r4:852b5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85192400 r8:852b532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5300 r8:80287e08 r7:eac21e60 r6:851eca80 r5:85192400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac35fb0 to 0xeac35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852adc40 INFO: task kworker/0:330:4252 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84ca3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc6-syzkaller #0 r4:85190c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dff97000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528bf8c r4:8528bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:852b5380 r8:80287e08 r7:eac21e60 r6:851ecb00 r5:85190c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 84d9c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4258 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:85195400 r4:85195400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85195400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85195400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529438c r4:85294000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529438c r4:852b5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85249480 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2300 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85196c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0027000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529478c r4:85294400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529478c r4:852b5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196c00 r8:852b54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5480 r8:80287e08 r7:eac2de60 r6:851ecc00 r5:85196c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c21c0 INFO: task kworker/0:333:4260 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8517e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4262 blocked for more than 453 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac49d84 r8:00000002 r7:60000013 r6:eac49d8c r5:8518d400 r4:8518d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c23c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518d400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0385000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85294b8c r4:85294800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85294b8c r4:852b5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8518d400 r8:852b552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5500 r8:80287e08 r7:eac41e60 r6:851ecc80 r5:8518d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2280 INFO: task kworker/0:334:4262 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 85280000 eab7b000 00000001 80239b98 7f2c5000 00000001 r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4264 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000113 r6:eac4dd8c r5:8518bc00 r4:8518bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8518bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8518bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85294f8c r4:85294c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85294f8c r4:852b5580 r10:61c88647 r9:8518bc00 r8:852b55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852c2400 Workqueue: events bpf_prog_free_deferred [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:4265 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000113 r6:eac0dd8c r5:85193c00 r4:85193c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85193c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e054f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511438c r4:85114000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511438c r4:851ecd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85193c00 r8:851ecdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ecd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ecd80 r8:80287e08 r7:ea9b5e60 r6:851ece00 r5:85193c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8080 INFO: task kworker/1:242:4265 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 85899000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:4268 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:4268 tgid:4268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac45d84 r8:00000002 r7:60000113 r6:eac45d8c r5:85196000 r4:85196000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85196000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85196000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4701000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511478c r4:85114400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511478c r4:851ece80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85196000 r8:851eceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ece80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ece80 r8:80287e08 r7:ea9b5e60 r6:851ecf00 r5:85196000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac45fb0 to 0xeac45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8180 INFO: task kworker/1:243:4268 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 85c74000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4270 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:85198000 r4:85198000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c29c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4755000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529578c r4:85295400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529578c r4:852b5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198000 r8:852b562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5600 r8:80287e08 r7:eac4de60 r6:851ecf80 r5:85198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2640 INFO: task kworker/0:336:4270 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8606b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4271 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4271 tgid:4271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac55d84 r8:00000002 r7:60000013 r6:eac55d8c r5:85198c00 r4:85198c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529538c r4:85295000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529538c r4:852b5680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198c00 r8:852b56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5680 r8:80287e08 r7:eac51e60 r6:852c7000 r5:85198c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c27c0 INFO: task kworker/0:337:4271 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86495000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4275 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:85199800 r4:85199800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85199800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85199800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea8d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85295f8c r4:85295c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85295f8c r4:852b5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85199800 r8:852b572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5700 r8:80287e08 r7:eac51e60 r6:852c7080 r5:85199800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac11fb0 to 0xeac11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2980 INFO: task kworker/0:338:4275 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86495000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4276 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac5dd84 r8:00000002 r7:60000013 r6:eac5dd8c r5:8519a400 r4:8519a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519a400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85295b8c r4:85295800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85295b8c r4:852b5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519a400 r8:852b57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5780 r8:80287e08 r7:eac11e60 r6:852c7100 r5:8519a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac5dfb0 to 0xeac5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c28c0 INFO: task kworker/0:339:4276 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86495000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4279 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac61d84 r8:00000002 r7:60000013 r6:eac61d8c r5:8519b000 r4:8519b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519b000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529638c r4:85296000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529638c r4:852b5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519b000 r8:852b582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5800 r8:80287e08 r7:eac11e60 r6:852c7180 r5:8519b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2bc0 INFO: task kworker/0:340:4279 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86c49000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:4280 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac6dd84 r8:00000002 r7:60000113 r6:eac6dd8c r5:8519bc00 r4:8519bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529678c r4:85296400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529678c r4:852b5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519bc00 r8:852b58ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5880 r8:80287e08 r7:eac61e60 r6:852c7200 r5:8519bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2d80 INFO: task kworker/0:341:4280 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86c49000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4283 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac75d84 r8:00000002 r7:60000013 r6:eac75d8c r5:8519c800 r4:8519c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85260880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296b8c r4:85296800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85296b8c r4:852b5900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519c800 r8:852b592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5900 r8:80287e08 r7:eac6de60 r6:852c7280 r5:8519c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2e80 INFO: task kworker/0:342:4283 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 86c49000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4285 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac79d84 r8:00000002 r7:60000013 r6:eac79d8c r5:8519d400 r4:8519d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519d400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529778c r4:85297400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529778c r4:852b5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519d400 r8:852b59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5980 r8:80287e08 r7:eac75e60 r6:852c7300 r5:8519d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85260e40 INFO: task kworker/0:343:4285 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87032000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4286 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:8519e000 r4:8519e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b90c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529738c r4:85297000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529738c r4:852b5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:852b5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5a00 r8:80287e08 r7:eac79e60 r6:852c7380 r5:8519e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2d80 INFO: task kworker/0:344:4286 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87223000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4288 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:8519ec00 r4:8519ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85114f8c r4:85114c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85114f8c r4:852c7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519ec00 r8:852c742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7400 r8:80287e08 r7:ea9b5e60 r6:852c7480 r5:8519ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8a40 INFO: task kworker/1:244:4288 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87789000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4289 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:851a0000 r4:851a0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85114b8c r4:85114800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85114b8c r4:852c7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a0000 r8:852c752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7500 r8:80287e08 r7:eac59e60 r6:852c7580 r5:851a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c8a40 INFO: task kworker/1:245:4289 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87ac2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4291 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac89d84 r8:00000002 r7:60000013 r6:eac89d8c r5:851a0c00 r4:851a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297b8c r4:85297800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85297b8c r4:852b5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a0c00 r8:852b5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5a80 r8:80287e08 r7:eac79e60 r6:852c7600 r5:851a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9080 INFO: task kworker/0:345:4291 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87ac2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4293 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac8dd84 r8:00000002 r7:60000013 r6:eac8dd8c r5:851a1800 r4:851a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b96c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529838c r4:85298000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529838c r4:852b5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a1800 r8:852b5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5b00 r8:80287e08 r7:eac89e60 r6:852c7680 r5:851a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b94c0 INFO: task kworker/0:346:4293 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87ac2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4297 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:851a2400 r4:851a2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511538c r4:85115000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511538c r4:852c7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a2400 r8:852c772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7700 r8:80287e08 r7:eac59e60 r6:852c7780 r5:851a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bf000 INFO: task kworker/1:246:4297 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 87eba000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4298 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:851a3000 r4:851a3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297f8c r4:85297c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85297f8c r4:852b5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a3000 r8:852b5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5b80 r8:80287e08 r7:eac8de60 r6:852c7800 r5:851a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b97c0 INFO: task kworker/0:347:4298 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88408000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4300 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:851a3c00 r4:851a3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85298b8c r4:85298800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85298b8c r4:852b5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a3c00 r8:852b5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5c00 r8:80287e08 r7:eac8de60 r6:852c7880 r5:851a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b98c0 INFO: task kworker/0:348:4300 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88408000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:4303 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:851a4800 r4:851a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511578c r4:85115400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511578c r4:852c7900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a4800 r8:852c792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7900 r8:80287e08 r7:eac81e60 r6:852c7980 r5:851a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bf280 INFO: task kworker/1:247:4303 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88734000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:4305 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:851a5400 r4:851a5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ac80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511638c r4:85116000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511638c r4:852c7a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a5400 r8:852c7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7a00 r8:80287e08 r7:eac95e60 r6:852c7a80 r5:851a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bf380 INFO: task kworker/1:248:4305 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88734000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4306 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:851a6000 r4:851a6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529878c r4:85298400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529878c r4:852b5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a6000 r8:852b5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5c80 r8:80287e08 r7:eac99e60 r6:852c7b00 r5:851a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9b80 INFO: task kworker/0:349:4306 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88d58000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4309 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:852e0c00 r4:852e0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85298f8c r4:85298c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85298f8c r4:852b5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e0c00 r8:852b5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5d00 r8:80287e08 r7:eac99e60 r6:852c7b80 r5:852e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb1fb0 to 0xeacb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9b80 INFO: task kworker/0:350:4309 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 88d58000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:4310 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:852e1800 r4:852e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85115b8c r4:85115800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85115b8c r4:852c7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e1800 r8:852c7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7c00 r8:80287e08 r7:eac9de60 r6:852c7c80 r5:852e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bf840 INFO: task kworker/1:249:4310 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 89223000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4312 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacbdd84 r8:00000002 r7:60000113 r6:eacbdd8c r5:852e3000 r4:852e3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85299b8c r4:85299800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85299b8c r4:852b5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e3000 r8:852b5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5d80 r8:80287e08 r7:eacb1e60 r6:852c7d00 r5:852e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9c40 INFO: task kworker/0:351:4312 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 89223000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:4313 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:852e3c00 r4:852e3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529938c r4:85299000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529938c r4:852b5e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e3c00 r8:852b5e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5e00 r8:80287e08 r7:eacbde60 r6:852c7d80 r5:852e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9c40 INFO: task kworker/0:352:4313 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 89cc0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4315 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd5d84 r8:00000002 r7:60000013 r6:eacd5d8c r5:852e2400 r4:852e2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529978c r4:85299400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529978c r4:852b5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e2400 r8:852b5eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5e80 r8:80287e08 r7:eacbde60 r6:852c7e00 r5:852e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9d40 INFO: task kworker/0:353:4315 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 89cc0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4317 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace9d84 r8:00000002 r7:60000013 r6:eace9d8c r5:852e0000 r4:852e0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8529a78c r4:8529a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a78c r4:852b5f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:852b5f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:eab2ddc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r9:83018005 r8:852e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 r5:85299f8c r4:85299c00 r7:dddced80 r6:83018000 r5:85299f8c r4:852b5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8a42c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4321 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:852e6c00 r4:852e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529a38c r4:8529a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529a38c r4:852c6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e6c00 r8:852c602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6000 r10:00000000 r9:852c6000 r8:80287e08 r7:eace9e60 r6:852c7f80 r5:852e6c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8a42c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:357:4324 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:357 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead25d84 r8:00000002 r7:60000113 r6:ead25d8c r5:852e5400 r4:852e5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e041d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b78c r4:8529b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529b78c r4:852c6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e5400 r8:852c60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6080 r8:80287e08 r7:eace9e60 r6:852cd000 r5:852e5400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: 8a817000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:82ac21e4 r4:eab2ddc0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4326 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:358 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead29d84 r8:00000002 r7:60000013 r6:ead29d8c r5:852e6000 r4:852e6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ab8c r4:8529a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ab8c r4:852c6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e6000 r8:852c612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6100 r8:80287e08 r7:ead25e60 r6:852cd080 r5:852e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bd5c0 INFO: task kworker/0:358:4326 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8a85f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4327 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4327 tgid:4327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:851a6c00 r4:851a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bd840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0389000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529b38c r4:8529b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529b38c r4:852c6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a6c00 r8:852c61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6180 r8:80287e08 r7:ead25e60 r6:852cd100 r5:851a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bd680 INFO: task kworker/0:359:4327 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8abeb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4332 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000013 r6:ead3dd8c r5:852e9800 r4:852e9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bda00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bb8c r4:8529b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529bb8c r4:852c6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e9800 r8:852c622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6200 r8:80287e08 r7:ead25e60 r6:852cd180 r5:852e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:4334 blocked for more than 454 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4334 tgid:4334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:852e8c00 r4:852e8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bdf00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cb8c r4:8529c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529cb8c r4:852c6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e8c00 r8:852c62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6280 r8:80287e08 r7:ead3de60 r6:852cd200 r5:852e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bda40 INFO: task kworker/0:361:4334 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8b0c6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4336 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:852eb000 r4:852eb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852eb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bdb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529bf8c r4:8529bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529bf8c r4:852c6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852eb000 r8:852c632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6300 r8:80287e08 r7:ead45e60 r6:852cd280 r5:852eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bda40 INFO: task kworker/0:362:4336 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8b4db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:4337 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:852e8000 r4:852e8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bdd00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c38c r4:8529c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529c38c r4:852c6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e8000 r8:852c63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6380 r8:80287e08 r7:ead45e60 r6:852cd300 r5:852e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bd8c0 INFO: task kworker/0:363:4337 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8b864000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:250:4339 blocked for more than 455 seconds. r10:8291a684 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:852ec800 r4:00000000 r4:00000000 r5:8511678c r4:85116400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852cd380 Exception stack(0xead69fb0 to 0xead69ff8) Workqueue: events bpf_prog_free_deferred dd20: 8ba7f000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c78c r4:8529c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529c78c r4:852c6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ed400 r8:852c642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6400 r8:80287e08 r7:ead45e60 r6:852cd480 r5:852ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852bdc40 INFO: task kworker/0:364:4340 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8bec5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4343 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:852ebc00 r4:852ebc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ebc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:852ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:8529d38c r4:8529d000 r10:61c88647 r9:852ebc00 r8:852c64ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4344 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4344 tgid:4344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:842e8c00 r4:842e8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842e8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cf8c r4:8529cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852c6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6500 r8:80287e08 r7:ead95e60 r6:852c6580 r5:842e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b9940 INFO: task kworker/0:366:4344 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8c611000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:842ee000 r4:842ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d78c r4:8529d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529d78c r4:852c6600 r4:852c6600 Exception stack(0xead81fb0 to 0xead81ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:368:4349 blocked for more than 455 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8529df8c r4:8529dc00 r10:61c88647 r9:842eec00 r8:852c672c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8c77d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4351 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8520d400 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529db8c r4:8529d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8520d400 r8:852c682c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred r5:84940000 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529e38c r4:8529e000 r7:dddced80 r6:83018000 r5:8529e38c r4:852c6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d9200 INFO: task kworker/0:370:4352 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8cf33000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:4355 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:84941800 r4:84941800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84941800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8529e78c r4:8529e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529e78c r4:852c6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:372:4357 blocked for more than 455 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9900 r5:8529eb8c r4:8529e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529eb8c r4:852c6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84940c00 r8:852c6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6b00 r8:80287e08 r7:eada9e60 r6:852c6b80 r5:84940c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadadfb0 to 0xeadadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d9700 INFO: task kworker/0:372:4357 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8d52e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ef8c r4:8529ec00 r7:dddced80 r6:83018000 r5:8529ef8c r4:852c6c00 r10:00000000 r9:852c6c00 r8:80287e08 r7:eadade60 r6:852c6c80 r5:84943c00 r4:852d9a40 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84944800 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84944800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f78c r4:8529f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f78c r4:852c6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84944800 r8:852c6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c6d00 r8:80287e08 r7:eadb1e60 r6:852c6d80 r5:84944800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d9b40 INFO: task kworker/0:374:4361 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8dbcd000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:375:4363 blocked for more than 455 seconds. r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:84943000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8529f38c r4:8529f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84943000 r8:852c6e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:4365 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb9d84 r8:00000002 r7:60000113 r6:eadb9d8c r5:84945400 r4:84945400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84945400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9fc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84945400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529fb8c r4:8529f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529fb8c r4:852c6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84945400 r8:852c6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d9ec0 INFO: task kworker/0:376:4365 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8dea0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8529ff8c r4:8529fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ff8c r4:8531d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8531d000 r8:80287e08 r7:eadb9e60 r6:8531d080 r5:84946000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:4370 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:84946c00 r4:84946c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84946c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84946c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85390b8c r4:85390800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85390b8c r4:8531d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84946c00 r8:8531d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531d100 r8:80287e08 r7:eadbde60 r6:8531d180 r5:84946c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc1fb0 to 0xeadc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531c000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:379:4371 blocked for more than 455 seconds. r10:8291a684 r9:eadc5d84 r8:00000002 r7:60000013 r6:eadc5d8c r5:84942400 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539038c r4:85390000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539038c r4:8531d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84942400 r8:8531d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531d200 r8:80287e08 r7:eadc1e60 r6:8531d280 r5:84942400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531c140 INFO: task kworker/0:379:4371 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8e8f3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4373 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c340 r5:8539078c r4:85390400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85358000 r8:8531d32c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 8ea37000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85390f8c r4:85390c00 r4:8531d400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531c300 INFO: task kworker/0:381:4375 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8edfc000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4377 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000013 r6:eadd1d8c r5:85359800 r4:85359800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85359800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539138c r4:85391000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539138c r4:8531d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4379 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:8535a400 r4:8535a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531cbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8535a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85391f8c r4:85391c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85391f8c r4:8531d600 r4:8531d600 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r4:85249480 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c900 r5:8539178c r4:85391400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8531d700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8531c740 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8f71f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4383 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:385 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:8535bc00 r4:8535bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531cb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8535bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85391b8c r4:85391800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85391b8c r4:8531d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535bc00 r8:8531d82c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4385 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000013 r6:eadf1d8c r5:8535c800 r4:8535c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8535c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539278c r4:85392400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539278c r4:8531d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535c800 r8:8531d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531d900 r8:80287e08 r7:eadd5e60 r6:8531d980 r5:8535c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531cc00 INFO: task kworker/0:386:4385 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 8fe81000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4386 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4386 tgid:4386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:8535d400 r4:8535d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ce00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8535d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539238c r4:85392000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539238c r4:8531da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8535d400 r8:8531da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531da00 r8:80287e08 r7:eadf1e60 r6:8531da80 r5:8535d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531cc00 INFO: task kworker/0:387:4386 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9021d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85392f8c r4:85392c00 r10:61c88647 r9:8535e000 r8:8531db2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9021d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4391 blocked for more than 455 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae11d84 r8:00000002 r7:60000013 r6:eae11d8c r5:8535ec00 r4:8535ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8535ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85392b8c r4:85392800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8531dc00 r8:80287e08 r7:eae05e60 r6:8531dc80 r5:8535ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:848a8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r5:00001000 r4:eae2f000 r5:8539378c r4:85393400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeae19fb0 to 0xeae19ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4395 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae25d84 r8:00000002 r7:60000013 r6:eae25d8c r5:848a8c00 r4:848a8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539338c r4:85393000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539338c r4:8531de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8c00 r8:8531de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8531de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531de00 r8:80287e08 r7:eae19e60 r6:8531de80 r5:848a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853322c0 INFO: task kworker/0:391:4395 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 90b8f000 eab7b000 00000001 80239b98 7f2c5000 00000001 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:848a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 r5:85393b8c r4:85393800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848a9800 r8:8531df2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 90d27000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4399 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:848aa400 r4:848aa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848aa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85393f8c r4:85393c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85393f8c r4:8533e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848aa400 r8:8533e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e000 r8:80287e08 r7:eae2de60 r6:8533e080 r5:848aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332700 INFO: task kworker/0:393:4399 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:394 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:848ab000 r4:848ab000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ab000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539c38c r4:8539c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539c38c r4:8533e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ab000 r8:8533e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e100 r8:80287e08 r7:eae39e60 r6:8533e180 r5:848ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332900 INFO: task kworker/0:394:4401 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 91348000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) task:kworker/0:395 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539cb8c r4:8539c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539cb8c r4:8533e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848abc00 r8:8533e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e200 r8:80287e08 r7:eae41e60 r6:8533e280 r5:848abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332a40 INFO: task kworker/0:395:4403 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 91348000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539c78c r4:8539c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848ac800 r8:8533e32c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeae61fb0 to 0xeae61ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332a40 INFO: task kworker/0:396:4404 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9154f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4407 blocked for more than 456 seconds. r4:848ad400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r9:83018005 r8:848ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539d38c r4:8539d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539d38c r4:8533e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ad400 r8:8533e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e400 r8:80287e08 r7:eae4de60 r6:8533e480 r5:848ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531cec0 INFO: task kworker/0:397:4407 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 91810000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4409 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae6dd84 r8:00000002 r7:60000113 r6:eae6dd8c r5:848ae000 r4:848ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ae000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539cf8c r4:8539cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539cf8c r4:8533e500 r10:61c88647 r9:848ae000 r8:8533e52c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:399:4411 blocked for more than 456 seconds. r4:848aec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539db8c r4:8539d800 r7:dddced80 r6:83018000 r5:8539db8c r4:8533e600 r10:61c88647 r9:848aec00 r8:8533e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e600 r8:80287e08 r7:eae55e60 r6:8533e680 r5:848aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534a100 INFO: task kworker/0:399:4411 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 918a7000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539d78c r4:8539d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539d78c r4:8533e700 r10:61c88647 r9:85360000 r8:8533e72c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534a800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85360c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539e78c r4:8539e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539e78c r4:8533e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85360c00 r8:8533e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e880 r8:80287e08 r7:eae79e60 r6:8533e900 r5:85360c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534a580 INFO: task kworker/0:401:4415 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 91f50000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4417 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85361800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539df8c r4:8539dc00 r10:61c88647 r9:85361800 r8:8533e82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd20: 922f8000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:4418 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:4418 tgid:4418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae65d84 r8:00000002 r7:60000013 r6:eae65d8c r5:85362400 r4:85362400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85362400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534a600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85362400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539e38c r4:8539e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539e38c r4:8533ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85362400 r8:8533ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533ea00 r10:00000000 r9:8533ea00 r8:80287e08 r7:eae8de60 r6:8533ea80 r5:85362400 INFO: task kworker/0:403:4418 is blocked on a mutex likely owned by task kworker/0:296:4183. dd20: 926a4000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4420 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85363c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539eb8c r4:8539e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539eb8c r4:8533eb00 r10:61c88647 r9:85363c00 r8:8533eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4422 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:85364800 r4:85364800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85364800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c0380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85364800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539f38c r4:8539f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539f38c r4:8533ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85364800 r8:8533ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533ec00 r8:80287e08 r7:eaea9e60 r6:8533ec80 r5:85364800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534a7c0 INFO: task kworker/0:405:4422 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r5:800f0013 r4:80239bb0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:406 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8539ef8c r4:8539ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8533ed00 r8:80287e08 r7:eaeb5e60 r6:8533ed80 r5:85365400 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:407:4426 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:85366c00 r4:85366c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85366c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853503c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85366c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0387000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8539fb8c r4:8539f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539fb8c r4:8533ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85366c00 r8:8533ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533ee00 r8:80287e08 r7:eaeb5e60 r6:8533ee80 r5:85366c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8534a940 INFO: task kworker/0:407:4426 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9306c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368000 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8539f78c r4:8539f400 r10:61c88647 r9:85368000 r8:8533ef2c r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:408:4430 is blocked on a mutex likely owned by task kworker/0:296:4183. Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9306c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4431 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaecdd84 r8:00000002 r7:60000013 r6:eaecdd8c r5:85368c00 r4:85368c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85368c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85419500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85368c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e473f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443d38c r4:8443d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443d38c r4:852cd580 r10:61c88647 r9:85368c00 r8:852cd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:852ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85116b8c r4:85116800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85116b8c r4:852cd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ea400 r8:852cd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852cd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cd680 r8:80287e08 r7:eaecde60 r6:852cd700 r5:852ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533ad00 INFO: task kworker/1:252:4433 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 936e3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0509000 r5:8539ff8c r4:8539fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852f0000 r8:8534b02c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853a838c r4:853a8000 r10:61c88647 r9:852f1800 r8:8534b0ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85350580 INFO: task kworker/0:410:4438 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 938f0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4439 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:852f2400 r4:852f2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350940 r9:83018005 r8:852f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:853a8b8c r4:853a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 r5:853a878c r4:853a8400 r10:61c88647 r9:852f0c00 r8:8534b1ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 93c24000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:4443 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaefdd84 r8:00000002 r7:60000013 r6:eaefdd8c r5:852f3000 r4:852f3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853a938c r4:853a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a938c r4:8534b200 r10:61c88647 r9:852f3000 r8:8534b22c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 93c24000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85243840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r9:83018005 r8:852f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:853a8f8c r4:853a8c00 r10:61c88647 r9:852f3c00 r8:8534b2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4448 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:852f6c00 r4:852f6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a978c r4:853a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a978c r4:8534b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f6c00 r8:8534b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b300 r8:80287e08 r7:eaefde60 r6:852cda80 r5:852f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85350a40 INFO: task kworker/0:415:4448 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 943d2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:4450 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:853aa38c r4:853aa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaf19fb0 to 0xeaf19ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:417:4452 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf1dd84 r8:00000002 r7:60000013 r6:eaf1dd8c r5:852f5400 r4:852f5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85350dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853a9b8c r4:853a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9b8c r4:8534b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f5400 r8:8534b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b400 r8:80287e08 r7:eaf19e60 r6:852cdb80 r5:852f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85350c80 INFO: task kworker/0:417:4452 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9473f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853a9f8c r4:853a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9f8c r4:8534b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f4800 r8:8534b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b480 r8:80287e08 r7:eaf19e60 r6:852cdc00 r5:852f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85350f80 INFO: task kworker/0:418:4454 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9473f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853aa78c r4:853aa400 r10:61c88647 r9:852ee000 r8:8534b52c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:852eec00 r4:852eec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852eec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aab8c r4:853aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aab8c r4:8534b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852eec00 r8:8534b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b580 r8:80287e08 r7:eaf25e60 r6:852cdd00 r5:852eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7100 INFO: task kworker/0:420:4458 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 94f8b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r5:852f8000 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:853aaf8c r4:853aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852f8000 r8:8534b62c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:852f8c00 r4:852f8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852f8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ab38c r4:853ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab38c r4:8534b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852f8c00 r8:8534b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b680 r8:80287e08 r7:eaf2de60 r6:852cde00 r5:852f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7340 INFO: task kworker/0:422:4462 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 953c2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r5:00001000 r4:eac13000 r5:853abb8c r4:853ab800 r7:dddced80 r6:83018000 r5:853abb8c r4:8534b700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4465 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:852fa400 r4:852fa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ab78c r4:853ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ab78c r4:8534b780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fa400 r8:8534b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b780 r8:80287e08 r7:eaf35e60 r6:852cdf00 r5:852fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf39fb0 to 0xeaf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7980 r5:853ac38c r4:853ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac38c r4:8534b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fbc00 r8:8534b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b800 r8:80287e08 r7:eaf35e60 r6:852cdf80 r5:852fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d75c0 INFO: task kworker/0:425:4467 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 95a29000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eac1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853abf8c r4:853abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853abf8c r4:8534b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fd400 r8:8534b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b880 r8:80287e08 r7:eaf41e60 r6:853de000 r5:852fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7680 INFO: task kworker/0:426:4469 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 95a29000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:427:4471 blocked for more than 456 seconds. r4:852fec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 r5:853acb8c r4:853ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8534b900 Exception stack(0xeaf51fb0 to 0xeaf51ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fe000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf59e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ac78c r4:853ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ac78c r4:8534b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fe000 r8:8534b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534b980 r8:80287e08 r7:eaf51e60 r6:853de100 r5:852fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf59fb0 to 0xeaf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7900 INFO: task kworker/0:428:4473 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 962a6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853ad78c r4:853ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85300c00 r8:8534ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4478 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf6dd84 r8:00000002 r7:60000113 r6:eaf6dd8c r5:85302400 r4:85302400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85302400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85302400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853acf8c r4:853acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853acf8c r4:8534ba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85302400 r8:8534baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534ba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ba80 r8:80287e08 r7:eaf65e60 r6:853de200 r5:85302400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7bc0 INFO: task kworker/0:430:4478 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 967a1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4481 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:85303c00 r4:85303c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85303c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d7e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85303c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ad38c r4:853ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ad38c r4:8534bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303c00 r8:8534bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bb00 r8:80287e08 r7:eaf65e60 r6:853de280 r5:85303c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533af80 INFO: task kworker/0:431:4481 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 967a1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4482 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85300000 r4:85300000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85300000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534abc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85300000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853adb8c r4:853ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853adb8c r4:8534bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85300000 r8:8534bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bb80 r8:80287e08 r7:eaf65e60 r6:853de300 r5:85300000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d7f40 INFO: task kworker/0:432:4482 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 968db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4484 blocked for more than 456 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:85303000 r4:85303000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85303000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85303000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ae78c r4:853ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ae78c r4:8534bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85303000 r8:8534bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bc00 r8:80287e08 r7:eaf7de60 r6:853de380 r5:85303000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed000 INFO: task kworker/0:433:4484 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 968db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4486 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:85305400 r4:85305400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85305400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853adf8c r4:853adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853adf8c r4:8534bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85305400 r8:8534bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bc80 r8:80287e08 r7:eaf8de60 r6:853de400 r5:85305400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed000 INFO: task kworker/0:434:4486 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 96f55000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4487 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000013 r6:eaf99d8c r5:85301800 r4:85301800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85301800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853ae38c r4:853ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853ae38c r4:8534bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85301800 r8:8534bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bd00 r8:80287e08 r7:eaf8de60 r6:853de480 r5:85301800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed000 INFO: task kworker/0:435:4487 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 96f55000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4489 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:85306c00 r4:85306c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85306c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85306c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853aeb8c r4:853ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853aeb8c r4:8534bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85306c00 r8:8534bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bd80 r8:80287e08 r7:eaf8de60 r6:853de500 r5:85306c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed1c0 INFO: task kworker/0:436:4489 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9716d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfdf9000 r5:853aef8c r4:853aec00 r10:61c88647 r9:852fb000 r8:8534be2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4494 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:852fc800 r4:852fc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852fc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e03ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853af38c r4:853af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853af38c r4:8534be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852fc800 r8:8534beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534be80 r8:80287e08 r7:eafade60 r6:853de600 r5:852fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb1fb0 to 0xeafb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed540 INFO: task kworker/0:438:4494 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 976cb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85304800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ed8c0 r5:853af78c r4:853af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8534bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bf00 r8:80287e08 r7:eafb1e60 r6:853de680 r5:85304800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed700 INFO: task kworker/0:439:4496 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 976cb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:4498 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85308000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853afb8c r4:853af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853afb8c r4:8534bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85308000 r8:8534bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534bf80 r8:80287e08 r7:eafb5e60 r6:853de700 r5:85308000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed800 INFO: task kworker/0:440:4498 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 97a2e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r5:00001000 r4:e068d000 r5:853aff8c r4:853afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853f9000 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4502 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:8530b000 r4:8530b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853edb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b038c r4:853b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b038c r4:853f9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530b000 r8:853f90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9080 r10:00000000 r9:853f9080 r8:80287e08 r7:eafd1e60 r6:853de800 r5:8530b000 INFO: task kworker/0:442:4502 is blocked on a mutex likely owned by task kworker/0:296:4183. dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:443:4504 blocked for more than 457 seconds. r5:85308c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853b078c r4:853b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85308c00 r8:853f912c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4506 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:8536b000 r4:8536b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ede00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8536b000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b0b8c r4:853b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b0b8c r4:853f9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536b000 r8:853f91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9180 r8:80287e08 r7:eafe5e60 r6:853f9200 r5:8536b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853edd00 INFO: task kworker/0:444:4506 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 984ba000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:8536c800 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b138c r4:853b1000 r10:61c88647 r9:8536c800 r8:853f92ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272b8c r4:85272800 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:446:4510 blocked for more than 457 seconds. r5:8536d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853b0f8c r4:853b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b0f8c r4:853f9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536d400 r8:853f93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9380 r8:80287e08 r7:eafe1e60 r6:853f9400 r5:8536d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ed740 INFO: task kworker/0:446:4510 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 985f7000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4513 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:8536e000 r4:8536e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406040 r5:853b178c r4:853b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b178c r4:853f9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r9:83018005 r8:8530bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2f8c r4:853b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b2f8c r4:853f9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530bc00 r8:853f95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9580 r8:80287e08 r7:eaff1e60 r6:853de900 r5:8530bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85406080 INFO: task kworker/0:448:4514 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 98cbe000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4516 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000013 r6:eb005d8c r5:8530e000 r4:8530e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530e000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b1b8c r4:853b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1b8c r4:853f9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530e000 r8:853f96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9680 r8:80287e08 r7:eaffde60 r6:853de980 r5:8530e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854061c0 INFO: task kworker/0:449:4516 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r5:00001000 r4:dfa09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:450:4518 blocked for more than 457 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853b1f8c r4:853b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b1f8c r4:853f9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530ec00 r8:853f962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9600 r8:80287e08 r7:eaffde60 r6:853dea00 r5:8530ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85406300 INFO: task kworker/0:450:4518 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 98fa2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:4519 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:8530c800 r4:8530c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:853b238c r4:853b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b2b8c r4:853b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b2b8c r4:853deb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530d400 r8:853deb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853deb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853deb00 r8:80287e08 r7:eaecde60 r6:853deb80 r5:8530d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8429ec00 INFO: task kworker/1:253:4523 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 99310000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:4525 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:8530a400 r4:8530a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8530a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540c040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85116f8c r4:85116c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85116f8c r4:853dec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8530a400 r8:853dec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853dec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dec00 r8:80287e08 r7:eaecde60 r6:853dec80 r5:8530a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f2080 INFO: task kworker/1:254:4525 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) task:kworker/0:452 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85406ec0 r5:853b3b8c r4:853b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3b8c r4:853f9780 r10:61c88647 r9:85306000 r8:853f97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854069c0 INFO: task kworker/0:452:4526 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 995ef000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4528 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84990000 r4:00000000 r4:00000000 r5:853b338c r4:853b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b338c r4:853f9800 r10:61c88647 r9:84990000 r8:853f982c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540c280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84990c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511738c r4:85117000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511738c r4:853ded80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84990c00 r8:853dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ded80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ded80 r8:80287e08 r7:eaecde60 r6:853dee80 r5:84990c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540c000 INFO: task kworker/1:255:4530 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 99cdd000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:84991800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r5:00001000 r4:ead97000 r5:853b378c r4:853b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853f9880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 task:kworker/1:256 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:84993c00 r4:84993c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84993c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540c6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84993c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8511778c r4:85117400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511778c r4:853def80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84993c00 r8:853defac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853def80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853def80 r8:80287e08 r7:eaecde60 r6:8540a000 r5:84993c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540c500 INFO: task kworker/1:256:4536 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9a03e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4537 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4537 tgid:4537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:84994800 r4:84994800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84994800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84994800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:853b3f8c r4:853b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b3f8c r4:853f9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:853f9900 r8:80287e08 r7:eb009e60 r6:8540a080 r5:84994800 INFO: task kworker/0:455:4537 is blocked on a mutex likely owned by task kworker/0:296:4183. dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 r5:00001000 r4:dfa09000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:84992400 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84992400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5b8c r4:853b5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5b8c r4:853f9980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84992400 r8:853f99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9980 r8:80287e08 r7:eb031e60 r6:8540a100 r5:84992400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85406fc0 INFO: task kworker/0:456:4539 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9a4c1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae01000 r5:853b438c r4:853b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853f9a00 r8:80287e08 r7:eb039e60 r6:8540a180 r5:84993000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853501c0 INFO: task kworker/0:457:4540 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9a4c1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 task:kworker/0:458 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853b478c r4:853b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84996c00 r8:853f9aac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 r4:85249480 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:459 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:85310000 r4:85310000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854031c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4b8c r4:853b4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4b8c r4:853f9b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310000 r8:853f9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9b00 r8:80287e08 r7:eb039e60 r6:8540a280 r5:85310000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403080 INFO: task kworker/0:459:4544 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9a9fa000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4546 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:85311800 r4:85311800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85311800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85311800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b4f8c r4:853b4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b4f8c r4:853f9b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85311800 r8:853f9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9b80 r8:80287e08 r7:eb039e60 r6:8540a300 r5:85311800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403180 INFO: task kworker/0:460:4546 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9a9fa000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4548 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:85310c00 r4:85310c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85310c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b538c r4:853b5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b538c r4:853f9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85310c00 r8:853f9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9c00 r8:80287e08 r7:eb039e60 r6:8540a380 r5:85310c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403080 INFO: task kworker/0:461:4548 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9afbe000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 r4:00000000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85313c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85313c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b578c r4:853b5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b578c r4:853f9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313c00 r8:853f9cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9c80 r8:80287e08 r7:eb039e60 r6:8540a400 r5:85313c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb07dfb0 to 0xeb07dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854033c0 INFO: task kworker/0:462:4550 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9afbe000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4552 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb095d84 r8:00000002 r7:60000113 r6:eb095d8c r5:85313000 r4:85313000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85313000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854039c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85313000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b638c r4:853b6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b638c r4:853f9d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85313000 r8:853f9d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9d00 r8:80287e08 r7:eb039e60 r6:8540a480 r5:85313000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403600 INFO: task kworker/0:463:4552 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9b37e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:4554 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:85314800 r4:85314800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85314800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854038c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85314800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b5f8c r4:853b5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b5f8c r4:853f9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85314800 r8:853f9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9d80 r8:80287e08 r7:eb095e60 r6:8540a500 r5:85314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403600 INFO: task kworker/0:464:4554 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 Exception stack(0xeab2dd28 to 0xeab2dd70) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85316000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85117f8c r4:85117c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85316000 r8:8540a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8540a580 r8:80287e08 r7:eaecde60 r6:8540a600 r5:85316000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9b70e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:4562 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:8536a400 r4:8536a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85419480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536a400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:83dceb8c r4:83dce800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:83dceb8c r4:8540a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536a400 r8:8540a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a680 r8:80287e08 r7:eaecde60 r6:853f9e00 r5:8536a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854190c0 INFO: task kworker/1:258:4562 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9bb73000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4563 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeddd84 r8:00000002 r7:60000113 r6:eaeddd8c r5:85369800 r4:85369800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85369800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403ac0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853b678c r4:853b6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b678c r4:853f9e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85369800 r8:853f9eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9e80 r8:80287e08 r7:eb095e60 r6:853f9f00 r5:85369800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403a40 INFO: task kworker/0:465:4563 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9bd55000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4564 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:8536ec00 r4:8536ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8536ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8536ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b838c r4:847b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847b838c r4:853f9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8536ec00 r8:853f9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f9f80 r8:80287e08 r7:eaedde60 r6:8541c000 r5:8536ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403a40 INFO: task kworker/0:466:4564 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9bd55000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8536bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:853b6f8c r4:853b6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:4567 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf09d84 r8:00000002 r7:60000013 r6:eaf09d8c r5:85366000 r4:85366000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85366000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85366000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b6b8c r4:853b6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b6b8c r4:8541c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85366000 r8:8541c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c180 r8:80287e08 r7:eaee1e60 r6:8541c200 r5:85366000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403cc0 INFO: task kworker/0:468:4567 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:259 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8546838c r4:85468000 r10:61c88647 r9:85316c00 r8:8540a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: dd20: 9c4a0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4573 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85315400 r4:85315400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85315400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85419600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85315400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea917000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8443d78c r4:8443d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8443d78c r4:8540a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85315400 r8:8540a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:260:4573 is blocked on a mutex likely owned by task kworker/0:296:4183. dd20: 9c4a0000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 task:kworker/1:261 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85468b8c r4:85468800 r10:61c88647 r9:85312400 r8:8540a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85419640 INFO: task kworker/1:261:4574 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9c811000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854199c0 r5:8546878c r4:85468400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85441800 r8:8540aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4578 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:85442400 r4:85442400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85442400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85419bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85442400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85468f8c r4:85468c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8540aa80 r8:80287e08 r7:eaf3de60 r6:8541c300 r5:85442400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9cc94000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r5:8546938c r4:85469000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546938c r4:8540ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440c00 r8:8540ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540ab00 r8:80287e08 r7:eb0a1e60 r6:8541c380 r5:85440c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85419c00 INFO: task kworker/1:264:4580 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9ccfa000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:4581 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:4581 tgid:4581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:85443000 r4:85443000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85443000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85403f00 r5:00001000 r4:eac23000 r5:85469f8c r4:85469c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:eab2ddc0 r5:85272b8c r4:85272800 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:4584 blocked for more than 457 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84996000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8546978c r4:85469400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84996000 r8:8540ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9d171000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85469b8c r4:85469800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85469b8c r4:8540ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84995400 r8:8540ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540ad00 r8:80287e08 r7:eb0a9e60 r6:8540ad80 r5:84995400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85403f40 INFO: task kworker/1:267:4586 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9d582000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8546a38c r4:8546a000 r10:61c88647 r9:85488000 r8:8540ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4590 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:85488c00 r4:85488c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85488c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85401140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85488c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546a78c r4:8546a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546a78c r4:8540af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85488c00 r8:8540af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540af00 r8:80287e08 r7:eaf71e60 r6:8540af80 r5:85488c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85401280 INFO: task kworker/1:269:4590 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9dbe8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8546ab8c r4:8546a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85405000 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:4594 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000113 r6:eb0b5d8c r5:8548a400 r4:8548a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854014c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546af8c r4:8546ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546af8c r4:85405100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548a400 r8:8540512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405100 r8:80287e08 r7:eb0c1e60 r6:85405180 r5:8548a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854012c0 INFO: task kworker/1:271:4594 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8546b38c r4:8546b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8548b000 r8:8540522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:4598 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c9d84 r8:00000002 r7:60000013 r6:eb0c9d8c r5:8548bc00 r4:8548bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85401940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546bb8c r4:8546b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546bb8c r4:85405300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548bc00 r8:8540532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405300 r8:80287e08 r7:eb0c5e60 r6:85405380 r5:8548bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85401780 INFO: task kworker/1:273:4598 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9e3ab000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854017c0 r5:8546b78c r4:8546b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 9e3ab000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4601 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:8548e000 r4:8548e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548e000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85474b8c r4:85474800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85474b8c r4:85405500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548e000 r8:8540552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405500 r8:80287e08 r7:eb0c9e60 r6:85405580 r5:8548e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4603 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0ddd84 r8:00000002 r7:60000113 r6:eb0ddd8c r5:85490000 r4:85490000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85490000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85401f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546bf8c r4:8546bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546bf8c r4:85405600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85490000 r8:8540562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405600 r8:80287e08 r7:eb0d5e60 r6:85405680 r5:85490000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85401c00 INFO: task kworker/1:276:4603 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:85491800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r5:00001000 r4:e057f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b7f8c r4:853b7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853b7f8c r4:8541c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85491800 r8:8541c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c480 r8:80287e08 r7:eaee1e60 r6:85405700 r5:85491800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418d40 INFO: task kworker/0:469:4606 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9ec65000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4607 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e9d84 r8:00000002 r7:60000013 r6:eb0e9d8c r5:85492400 r4:85492400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85492400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853b7b8c r4:853b7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85492400 r8:8541c52c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85490c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe040 r5:8547438c r4:85474000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4612 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:85493c00 r4:85493c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85493c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85493c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547478c r4:85474400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547478c r4:85405900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85493c00 r8:8540592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405900 r8:80287e08 r7:eb0d5e60 r6:85405980 r5:85493c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fe100 INFO: task kworker/1:278:4612 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9f11b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85249480 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:279 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8547538c r4:85475000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85494800 r8:85405a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fe100 INFO: task kworker/1:279:4613 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9f499000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4616 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0edd84 r8:00000002 r7:60000013 r6:eb0edd8c r5:85495400 r4:85495400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85495400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf73000 r5:85474f8c r4:85474c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85474f8c r4:85405b00 r10:61c88647 r9:85495400 r8:85405b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 9f84a000 eab7b000 00000001 80239b98 7f2c5000 00000001 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:281:4619 blocked for more than 458 seconds. task:kworker/1:281 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f1d84 r8:00000002 r7:60000113 r6:eb0f1d8c r5:85496000 r4:85496000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85496000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547578c r4:85475400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547578c r4:85405c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85496000 r8:85405c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405c00 r8:80287e08 r7:eb0d9e60 r6:85405c80 r5:85496000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f1fb0 to 0xeb0f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fe5c0 INFO: task kworker/1:281:4619 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9fa01000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:282:4620 blocked for more than 458 seconds. r4:85496c00 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853feb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85475f8c r4:85475c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85475f8c r4:85405d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85496c00 r8:85405d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405d00 r8:80287e08 r7:eb0f1e60 r6:85405d80 r5:85496c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 task:kworker/1:283 state:D stack:0 pid:4621 tgid:4621 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85493000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:85475b8c r4:85475800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9fc22000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4624 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f9d84 r8:00000002 r7:60000013 r6:eb0f9d8c r5:8548ec00 r4:8548ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fec80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb059000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547638c r4:85476000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547638c r4:85405f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548ec00 r8:85405f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85405f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85405f00 r8:80287e08 r7:eb0f5e60 r6:85405f80 r5:8548ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853feb40 INFO: task kworker/1:284:4624 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: 9fc22000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:4626 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:8548d400 r4:8548d400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547678c r4:85476400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8548d400 r8:853e402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85476b8c r4:85476800 r10:61c88647 r9:85498000 r8:853e412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85419d80 INFO: task kworker/1:286:4629 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a0270000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:4630 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:85498c00 r4:85498c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85498c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85476f8c r4:85476c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85476f8c r4:853e4200 r10:00000000 r9:853e4200 r8:80287e08 r7:eb10de60 r6:853e4280 r5:85498c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4632 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85499800 r4:85499800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85499800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85477f8c r4:85477c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85477f8c r4:853e4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85499800 r8:853e432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4300 r8:80287e08 r7:eb119e60 r6:853e4380 r5:85499800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5080 INFO: task kworker/1:288:4632 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a05e6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:289:4633 blocked for more than 458 seconds. r4:8549a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547738c r4:85477000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8549a400 r8:853e442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a05e6000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred r4:8549b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8549b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e53c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547778c r4:85477400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547778c r4:853e4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8549b000 r8:853e452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4500 r8:80287e08 r7:eb101e60 r6:853e4580 r5:8549b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5500 INFO: task kworker/1:290:4636 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a0919000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa65000 r5:85477b8c r4:85477800 r7:ddde2d80 r6:83018200 r5:85477b8c r4:853e4600 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a0b44000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:4640 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:4640 tgid:4640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb141d84 r8:00000002 r7:60000013 r6:eb141d8c r5:8549c800 r4:8549c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8549c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547c38c r4:8547c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547c38c r4:853e4700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8549c800 r8:853e472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4700 r8:80287e08 r7:eb101e60 r6:853e4780 r5:8549c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5780 INFO: task kworker/1:292:4640 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a0d2b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:293 state:D stack:0 pid:4642 tgid:4642 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0435000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547c78c r4:8547c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547c78c r4:853e4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8549d400 r8:853e482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4800 r8:80287e08 r7:eb141e60 r6:853e4880 r5:8549d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5700 INFO: task kworker/1:293:4642 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a1003000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r4:8549e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547cb8c r4:8547c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547cb8c r4:853e4900 r4:853e4900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r5:800f0013 r4:80239bb0 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5c40 r9:83018205 r8:8549ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547cf8c r4:8547cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547cf8c r4:853e4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8549ec00 r8:853e4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4a00 r8:80287e08 r7:eb149e60 r6:853e4a80 r5:8549ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5cc0 INFO: task kworker/1:295:4646 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a172d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:854a0000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8547d78c r4:8547d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854a0000 r8:853e4b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4649 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:854a0c00 r4:854a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e5e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea851000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547d38c r4:8547d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547d38c r4:853e4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a0c00 r8:853e4c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4c00 r8:80287e08 r7:eb151e60 r6:853e4c80 r5:854a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5f80 INFO: task kworker/1:297:4649 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:854a1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547df8c r4:8547dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:4653 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:854a2400 r4:854a2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547db8c r4:8547d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547db8c r4:853e4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a2400 r8:853e4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853e4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e4e00 r8:80287e08 r7:eb155e60 r6:853e4e80 r5:854a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e5f40 INFO: task kworker/1:299:4653 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a1e7a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:4655 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:854a3000 r4:854a3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547ef8c r4:8547ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853e4f00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351280 INFO: task kworker/1:300:4655 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a1e7a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4657 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb161d84 r8:00000002 r7:60000013 r6:eb161d8c r5:854a3c00 r4:854a3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547e38c r4:8547e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547e38c r4:8534e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8534e000 r8:80287e08 r7:eb15de60 r6:8534e080 r5:854a3c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r5:00001000 r4:ead0d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:854a4800 r8:8534e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a21c5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4663 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb16dd84 r8:00000002 r7:60000013 r6:eb16dd8c r5:854a5400 r4:854a5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547eb8c r4:8547e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547eb8c r4:8534e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a5400 r8:8534e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e200 r8:80287e08 r7:eb15de60 r6:8534e280 r5:854a5400 Exception stack(0xeb16dfb0 to 0xeb16dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:304 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547f38c r4:8547f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547f38c r4:8534e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a6000 r8:8534e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e300 r8:80287e08 r7:eb15de60 r6:8534e380 r5:854a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351740 INFO: task kworker/1:304:4665 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a2994000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547fb8c r4:8547f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4668 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:854a8000 r4:854a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547f78c r4:8547f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547f78c r4:8534e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854a8000 r8:8534e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e500 r8:80287e08 r7:eb175e60 r6:8534e580 r5:854a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb169fb0 to 0xeb169ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351a00 INFO: task kworker/1:306:4668 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:307:4671 blocked for more than 458 seconds. r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:854a8c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b838c r4:854b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854a8c00 r8:8534e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: a3154000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4674 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:854aa400 r4:854aa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854aa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547ff8c r4:8547fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547ff8c r4:8534e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854aa400 r8:8534e72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e700 r8:80287e08 r7:eb179e60 r6:8534e780 r5:854aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351cc0 INFO: task kworker/1:308:4674 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a3433000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:309:4675 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b8f8c r4:854b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b8f8c r4:8534e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854ab000 r8:8534e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e800 r8:80287e08 r7:eb179e60 r6:8534e880 r5:854ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85351cc0 INFO: task kworker/1:309:4675 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a3985000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4676 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:854abc00 r4:854abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b878c r4:854b8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b878c r4:8534e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854abc00 r8:8534e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534e900 r8:80287e08 r7:eb185e60 r6:8534e980 r5:854abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336040 INFO: task kworker/1:310:4676 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a3e81000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:4679 blocked for more than 458 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:854ac800 r4:854ac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854ac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336340 r5:00001000 r4:eae47000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b8b8c r4:854b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854ac800 r8:8534ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:4681 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:85446c00 r4:85446c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b938c r4:854b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b938c r4:8534eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446c00 r8:8534eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534eb00 r8:80287e08 r7:eb185e60 r6:8541c580 r5:85446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853363c0 INFO: task kworker/1:312:4681 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a4026000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:4682 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:85446000 r4:85446000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85446000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85446000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bab8c r4:854ba800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bab8c r4:8534eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85446000 r8:8534ebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534eb80 r8:80287e08 r7:eb199e60 r6:8541c600 r5:85446000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336700 INFO: task kworker/1:313:4682 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a4026000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85443c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85443c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b978c r4:854b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b978c r4:8534ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85443c00 r8:8534ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ec00 r8:80287e08 r7:eb1a1e60 r6:8541c680 r5:85443c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85336500 INFO: task kworker/1:314:4684 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a433d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:4686 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:85440000 r4:85440000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85440000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85440000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b9b8c r4:854b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b9b8c r4:8534ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85440000 r8:8534ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ec80 r8:80287e08 r7:eb1a1e60 r6:8541c700 r5:85440000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853367c0 INFO: task kworker/1:315:4686 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a433d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:00001000 r4:eafb7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 r5:849c8000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85336ac0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: a493a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eafeb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ba78c r4:854ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a4d81000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4696 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:854aec00 r4:854aec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854aec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d4f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb033000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854baf8c r4:854bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854baf8c r4:8531e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4699 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:854a9800 r4:854a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85351f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb041000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bb38c r4:854bb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bb38c r4:8531e100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:4701 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000113 r6:eb1d1d8c r5:854b0000 r4:854b0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dd880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c4f8c r4:854c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c4f8c r4:8531e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b0000 r8:8531e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531e200 r8:80287e08 r7:eb1c1e60 r6:8531e280 r5:854b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd040 INFO: task kworker/1:322:4701 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a520c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:4702 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1cdd84 r8:00000002 r7:60000113 r6:eb1cdd8c r5:854b0c00 r4:854b0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dd1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bbb8c r4:854bb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bbb8c r4:8531e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b0c00 r8:8531e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531e300 r8:80287e08 r7:eb1d1e60 r6:8531e380 r5:854b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd300 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bbf8c r4:854bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bbf8c r4:8531e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b1800 r8:8531e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531e400 r8:80287e08 r7:eb1d1e60 r6:8531e480 r5:854b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd280 INFO: task kworker/1:324:4706 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a5819000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243840 task:kworker/1:325 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r5:00001000 r4:eb1e3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:854c438c r4:8531e500 r4:8531e500 Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd440 INFO: task kworker/1:325:4707 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a5819000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:4709 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000113 r6:eb1edd8c r5:854b3000 r4:854b3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb1e9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c478c r4:854c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8531e600 r8:80287e08 r7:eb1d1e60 r6:8531e680 r5:854b3000 r4:852dd440 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8531e700 r10:00000000 r9:8531e700 r8:80287e08 r7:eb1d1e60 r6:8531e780 r5:854b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dd780 INFO: task kworker/1:327:4712 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a605c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:4713 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:4713 tgid:4713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d9d84 r8:00000002 r7:60000113 r6:eb1d9d8c r5:854b4800 r4:854b4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c538c r4:854c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c538c r4:8531e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b4800 r8:8531e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r5:00001000 r4:dfa1f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c578c r4:854c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c578c r4:8531e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b6000 r8:8531e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531e900 r8:80287e08 r7:eb1d9e60 r6:8531e980 r5:854b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dda80 INFO: task kworker/1:329:4715 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a6463000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4720 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb201d84 r8:00000002 r7:60000013 r6:eb201d8c r5:849cb000 r4:849cb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531fe80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acdb8c r4:84acd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84acdb8c r4:8541c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cb000 r8:8541c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541c880 r8:80287e08 r7:eb0e5e60 r6:8541c900 r5:849cb000 r4:00000001 Exception stack(0xeb201fb0 to 0xeb201ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r5:849c9800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531fc40 INFO: task kworker/0:472:4721 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a6463000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:4723 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:849cbc00 r4:849cbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849cbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b878c r4:847b8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847b878c r4:8531ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8531ea00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb225d84 r8:00000002 r7:60000013 r6:eb225d8c r5:849cc800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e0621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c5f8c r4:854c5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c5f8c r4:8531ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cc800 r8:8531eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8531ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531ea80 r8:80287e08 r7:eb21de60 r6:8541cb00 r5:849cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ddb40 INFO: task kworker/1:331:4724 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a69f0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8541cc00 r8:80287e08 r7:eb215e60 r6:8541cc80 r5:849cd400 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:849ce000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c4b8c r4:853c4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c4b8c r4:8541cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ce000 r8:8541cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cb80 r8:80287e08 r7:eb221e60 r6:8541cd00 r5:849ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8531f800 INFO: task kworker/0:474:4728 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a71bb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4730 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ddd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c478c r4:853c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c478c r4:8541cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849cec00 r8:8541cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541cd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cd80 r8:80287e08 r7:eb229e60 r6:8541ce00 r5:849cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889040 INFO: task kworker/0:475:4730 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a71bb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:4732 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:849ca400 r4:849ca400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ca400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d41c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c4f8c r4:853c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c4f8c r4:8541ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ca400 r8:8541ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4300 INFO: task kworker/0:476:4732 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a73b1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4734 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:849c8c00 r4:849c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4540 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c578c r4:853c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 Exception stack(0xeb235fb0 to 0xeb235ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd20: a750b000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85363000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c538c r4:853c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c538c r4:852dc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85363000 r8:852dc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc100 r8:80287e08 r7:eb235e60 r6:852dc180 r5:85363000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4280 INFO: task kworker/0:478:4736 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a790d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4738 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb23dd84 r8:00000002 r7:60000013 r6:eb23dd8c r5:85444800 r4:85444800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85444800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eace3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5b8c r4:853c5800 r7:dddced80 r6:83018000 r5:853c5b8c r4:852dc200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a790d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4740 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb241d84 r8:00000002 r7:60000013 r6:eb241d8c r5:849f8000 r4:849f8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c5f8c r4:853c5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c5f8c r4:852dc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f8000 r8:852dc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc300 r8:80287e08 r7:eb23de60 r6:852dc380 r5:849f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4900 INFO: task kworker/0:480:4740 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd20: a790d000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c638c r4:853c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c638c r4:852dc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f8c00 r8:852dc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc400 r8:80287e08 r7:eb241e60 r6:852dc480 r5:849f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4a80 INFO: task kworker/0:481:4742 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a7da8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4744 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:849f9800 r4:849f9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849f9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6f8c r4:853c6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c6f8c r4:852dc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849f9800 r8:852dc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc500 r8:80287e08 r7:eb245e60 r6:852dc580 r5:849f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4880 INFO: task kworker/0:482:4744 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a7da8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4745 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:849fa400 r4:849fa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849fa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c678c r4:853c6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c678c r4:852dc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849fa400 r8:852dc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc600 r8:80287e08 r7:eb249e60 r6:852dc680 r5:849fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4b00 INFO: task kworker/0:483:4745 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a809b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4748 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb25dd84 r8:00000002 r7:60000113 r6:eb25dd8c r5:854b5400 r4:854b5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854b5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d4d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c6b8c r4:853c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c6b8c r4:852dc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854b5400 r8:852dc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc700 r8:80287e08 r7:eb249e60 r6:8531eb00 r5:854b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4d00 INFO: task kworker/0:484:4748 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b580 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d4f40 INFO: task kworker/0:485:4750 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a8737000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:486:4751 blocked for more than 459 seconds. r4:85429800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853c738c r4:853c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85429800 r8:852dc82c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:85428000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r9:83018005 r8:85428000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r5:853c778c r4:853c7400 r10:61c88647 r9:85428000 r8:852dc8ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4755 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb279d84 r8:00000002 r7:60000013 r6:eb279d8c r5:8542bc00 r4:8542bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853c7b8c r4:853c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853c7b8c r4:852dc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542bc00 r8:852dc92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dc900 r8:80287e08 r7:eb265e60 r6:8531ed00 r5:8542bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b140 INFO: task kworker/0:488:4755 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a8e8b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853c7f8c r4:853c7c00 r10:61c88647 r9:8542b000 r8:852dc9ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a8e8b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:4759 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:8542a400 r4:8542a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f438c r4:853f4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8542c800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r9:83018005 r8:8542c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:853f4b8c r4:853f4800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4765 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:8542e000 r4:8542e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533b940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542e000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f538c r4:853f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f538c r4:852dcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542e000 r8:852dcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dcb00 r8:80287e08 r7:eb295e60 r6:8531ef00 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b640 INFO: task kworker/0:492:4765 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:854b6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f4f8c r4:853f4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8533b640 INFO: task kworker/0:493:4766 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a978f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4768 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:8542d400 r4:8542d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533bbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f5b8c r4:853f5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f5b8c r4:852dcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542d400 r8:852dcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533b880 INFO: task kworker/0:494:4768 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a98ed000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb11d000 r5:853f578c r4:853f5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f578c r4:852dcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85430000 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533be00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85430000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f638c r4:853f6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f638c r4:852dcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85430000 r8:852dcd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dcd00 r8:80287e08 r7:eb2a9e60 r6:8534c100 r5:85430000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533bc00 INFO: task kworker/0:496:4772 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: a9e7c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4774 blocked for more than 459 seconds. Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f5f8c r4:853f5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853f678c r4:853f6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f678c r4:852dce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85431800 r8:852dce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dce00 r8:80287e08 r7:eb2b1e60 r6:8534c200 r5:85431800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533bd40 INFO: task kworker/0:498:4776 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: aa1c0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4782 blocked for more than 459 seconds. Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f6b8c r4:853f6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852dce80 Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4783 blocked for more than 459 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:85433c00 r4:85433c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85433c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d0540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85433c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e87d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c638c r4:854c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c638c r4:8534c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85433c00 r8:8534c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534c300 r8:80287e08 r7:eb21de60 r6:8534c380 r5:85433c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d0340 INFO: task kworker/1:332:4783 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: aa797000 eab7b000 00000001 80239b98 7f2c5000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85434800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfb03000 r5:853f6f8c r4:853f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852dcf00 r8:80287e08 r7:eb2d5e60 r6:8534c400 r5:85434800 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85435400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eab95000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f778c r4:853f7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f778c r4:852dcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85435400 r8:852dcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852dcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852dcf80 r8:80287e08 r7:eb2dde60 r6:8534c480 r5:85435400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348240 INFO: task kworker/0:501:4786 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ab2a3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4787 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:85436000 r4:85436000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85436000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85436000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:853f738c r4:853f7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f738c r4:8541cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436000 r8:8541cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8541cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8541cf80 r8:80287e08 r7:eb2d1e60 r6:8534c500 r5:85436000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348240 INFO: task kworker/0:502:4787 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ab2a3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85433000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d0780 r5:854c678c r4:854c6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 task:kworker/1:334 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000013 r6:eb2e9d8c r5:85438c00 r4:85438c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d0a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea98d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c6b8c r4:854c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c6b8c r4:8534c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:8534c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534c680 r8:80287e08 r7:eb21de60 r6:8534c700 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d09c0 INFO: task kworker/1:334:4790 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: abdde000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000013 r6:eb2edd8c r5:85439800 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854c6f8c r4:854c6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb2edfb0 to 0xeb2edff8) Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: abdde000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4794 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4794 tgid:4794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2f9d84 r8:00000002 r7:60000113 r6:eb2f9d8c r5:8543b000 r4:8543b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8542478c r4:85424400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8542478c r4:8534d000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543b000 r8:8534d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d000 r8:80287e08 r7:eb2d1e60 r6:8534c880 r5:8543b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348580 INFO: task kworker/0:503:4794 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ac626000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4796 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:8543a400 r4:8543a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f7b8c r4:853f7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853f7b8c r4:8534d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853f7f8c r4:853f7c00 r10:61c88647 r9:85438000 r8:8534d12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8534d100 r8:80287e08 r7:eb2f9e60 r6:8534c980 r5:85438000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853486c0 INFO: task kworker/0:505:4800 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: acb67000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb309d84 r8:00000002 r7:60000113 r6:eb309d8c r5:8543bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c738c r4:854c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8543bc00 r8:8534ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8534ca00 r8:80287e08 r7:eb21de60 r6:8534ca80 r5:8543bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db100 INFO: task kworker/1:336:4801 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: acc51000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb30dd84 r8:00000002 r7:60000013 r6:eb30dd8c r5:8543e000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854c778c r4:854c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c778c r4:8534cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8543d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c7b8c r4:854c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c7b8c r4:8534cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543d400 r8:8534cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534cc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534cc00 r8:80287e08 r7:eb21de60 r6:8534cc80 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db100 INFO: task kworker/1:338:4804 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ad3b8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:8543c800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db6c0 r5:854c7f8c r4:854c7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8543c800 r8:8534cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534cd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534cd00 r8:80287e08 r7:eb21de60 r6:8534cd80 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db0c0 INFO: task kworker/1:339:4807 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ad3b8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4809 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8543ec00 r4:8291a680 r4:00000000 r9:83018005 r8:8543ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:8542438c r4:85424000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:340:4812 blocked for more than 460 seconds. r5:85436c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853db8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d838c r4:854d8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854d838c r4:8534ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85436c00 r8:8534ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8534ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534ce80 r8:80287e08 r7:eb21de60 r6:8534cf00 r5:85436c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853db7c0 INFO: task kworker/1:340:4812 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ad3b8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:341:4813 blocked for more than 460 seconds. r5:854f0000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854d8b8c r4:854d8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854f0000 r8:8534cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4815 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb319d84 r8:00000002 r7:60000113 r6:eb319d8c r5:854f0c00 r4:854f0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dbb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854d878c r4:854d8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854d878c r4:85353080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f0c00 r8:853530ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85353080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85353080 r8:80287e08 r7:eb2f5e60 r6:85353100 r5:854f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dbc40 INFO: task kworker/1:342:4815 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ae0b3000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:854f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:854d8f8c r4:854d8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dbbc0 INFO: task kworker/1:343:4818 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ae0b3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854d978c r4:854d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854f2400 r8:853532ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854d938c r4:854d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854d938c r4:85353380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f3000 r8:853533ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85353380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85353380 r8:80287e08 r7:eb321e60 r6:85353400 r5:854f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dbd80 INFO: task kworker/1:345:4821 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ae7fb000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854d9b8c r4:854d9800 r7:ddde2d80 r6:83018200 r5:854d9b8c r4:85353480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f4800 r8:853534ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85353480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85353480 r8:80287e08 r7:eb321e60 r6:85353500 r5:854f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:00001000 r4:dfa09000 r4:00000001 task:kworker/1:347 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854d9f8c r4:854d9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:85349100 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:85272b8c r4:85272800 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:4827 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:854f6c00 r4:854f6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85349ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854daf8c r4:854dac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:00001000 r4:dfa09000 r4:00000001 INFO: task kworker/1:349:4828 blocked for more than 460 seconds. r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85353780 r8:80287e08 r7:eb335e60 r6:85353800 r5:854f8c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: af5a6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:854f9800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854da78c r4:854da400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:854fb000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85424b8c r4:85424800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85424b8c r4:8534d200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fb000 r8:8534d22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d200 r8:80287e08 r7:eb2f9e60 r6:85353a00 r5:854fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348e80 INFO: task kworker/0:507:4832 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r4:85249480 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85425f8c r4:85425c00 r10:61c88647 r9:854fbc00 r8:8534d2ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:85249480 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:85424f8c r4:85424c00 r7:dddced80 r6:83018000 r5:85424f8c r4:8534d300 r10:61c88647 r9:854fc800 r8:8534d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d300 r8:80287e08 r7:eb365e60 r6:85353b00 r5:854fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348b40 INFO: task kworker/0:509:4835 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b04e5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8542578c r4:85425400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb371fb0 to 0xeb371ff8) r4:00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4841 blocked for more than 460 seconds. r4:854f8000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:854db78c r4:854db400 r7:ddde2d80 r6:83018200 r5:854db78c r4:85353c00 r4:853499c0 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:00000000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:352:4842 blocked for more than 460 seconds. r5:854fe000 r4:8291a680 r4:00000000 r4:00000000 r5:854db38c r4:854db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854db38c r4:85353d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fe000 r8:85353dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85353d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85353d80 r8:80287e08 r7:eb36de60 r6:85353e00 r5:854fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853d0c80 INFO: task kworker/1:352:4842 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b04e5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb38b000 r5:854dbb8c r4:854db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854dbb8c r4:85353d00 r4:85353d00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854ec78c r4:854ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ec78c r4:85353f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854fa400 r8:85353f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85353f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85353f00 r8:80287e08 r7:eb375e60 r6:85353f80 r5:854fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533c300 INFO: task kworker/1:354:4847 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b099c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4849 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb395d84 r8:00000002 r7:60000113 r6:eb395d8c r5:854f6000 r4:854f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:854f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb391000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854dbf8c r4:854dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854dbf8c r4:85342000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:854f6000 r8:8534202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85342000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85342000 r8:80287e08 r7:eb389e60 r6:85342080 r5:854f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854ec38c r4:854ec000 r10:61c88647 r9:854f3c00 r8:8534212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85500000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853417c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85425b8c r4:85425800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85425b8c r4:8534d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85500000 r8:8534d42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d400 r8:80287e08 r7:eb365e60 r6:85342200 r5:85500000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85341540 INFO: task kworker/0:511:4853 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b0c9b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4856 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85426b8c r4:85426800 r10:61c88647 r9:85500c00 r8:8534d4ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb28dd84 r8:00000002 r7:60000013 r6:eb28dd8c r5:85501800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8542638c r4:85426000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8534d500 r8:80287e08 r7:eb285e60 r6:85342300 r5:85501800 r4:85341a40 INFO: task kworker/0:513:4858 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b1102000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4859 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb39dd84 r8:00000002 r7:60000113 r6:eb39dd8c r5:85502400 r4:85502400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85502400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341f40 r5:8542678c r4:85426400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8542678c r4:8534d580 r10:61c88647 r9:85502400 r8:8534d5ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85503000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ca00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85503000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ecb8c r4:854ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ecb8c r4:85342400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85503000 r8:8534242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85342400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85342400 r8:80287e08 r7:eb389e60 r6:85342480 r5:85503000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533c840 INFO: task kworker/1:357:4862 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b1582000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4863 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a5d84 r8:00000002 r7:60000113 r6:eb3a5d8c r5:85503c00 r4:85503c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85503c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533cc40 r5:854ecf8c r4:854ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ecf8c r4:85342500 r10:61c88647 r9:85503c00 r8:8534252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85504800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854edf8c r4:854edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85342600 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4867 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85505400 r4:85505400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85505400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532fa00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85505400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ed38c r4:854ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ed38c r4:85342700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85505400 r8:8534272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85342700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85342700 r8:80287e08 r7:eb3a9e60 r6:85342780 r5:85505400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8533cc00 INFO: task kworker/1:360:4867 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4870 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000013 r6:eb3bdd8c r5:85506000 r4:85506000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85506000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341b80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85426f8c r4:85426c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85506000 r8:8534d62c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:85508c00 r4:85508c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85508c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84889180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85508c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:8542738c r4:85427000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8542738c r4:8534d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb3cdd84 r8:00000002 r7:60000013 r6:eb3cdd8c r5:8550a400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8554838c r4:85548000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550a400 r8:8534d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d700 r8:80287e08 r7:eb3c5e60 r6:85342900 r5:8550a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889200 INFO: task kworker/0:517:4874 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b20aa000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4875 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:85508000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r5:00001000 r4:eaf5d000 r5:8542778c r4:85427400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8542778c r4:8534d780 r4:8534d780 1fa0: 00000000 00000000 00000000 00000000 Call trace: r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b25e9000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:4877 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:85509800 r4:85509800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85509800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341100 r5:85427b8c r4:85427800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85427b8c r4:8534d800 r4:8534d800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 r4:8550b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85427f8c r4:85427c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b29e6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4881 blocked for more than 460 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:8550d400 r4:8550d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853431c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550d400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acdf8c r4:84acdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84acdf8c r4:8534d900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550d400 r8:8534d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534d900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534d900 r8:80287e08 r7:eb3cde60 r6:85342b00 r5:8550d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85343100 INFO: task kworker/0:521:4881 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b2b92000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:522:4884 blocked for more than 461 seconds. r5:8550bc00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85548b8c r4:85548800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8550bc00 r8:8534d9ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4885 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:8550e000 r4:8550e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853434c0 r4:00000000 r5:00001000 r4:eb125000 r5:8554878c r4:85548400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554878c r4:8534da00 r10:61c88647 r9:8550e000 r8:8534da2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8550ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854ed78c r4:854ed400 r10:61c88647 r9:8550ec00 r8:85342cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4889 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:8550c800 r4:8550c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85343740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550c800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85548f8c r4:85548c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85548f8c r4:8534da80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550c800 r8:8534daac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534da80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534da80 r8:80287e08 r7:eb3ede60 r6:85342d80 r5:8550c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85343580 INFO: task kworker/0:524:4889 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b376a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85506c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554938c r4:85549000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8534db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534db00 r8:80287e08 r7:eb3f5e60 r6:85342e00 r5:85506c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853436c0 INFO: task kworker/0:525:4892 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b3b1a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4894 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3fdd84 r8:00000002 r7:60000113 r6:eb3fdd8c r5:855b8000 r4:855b8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85549f8c r4:85549c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85549f8c r4:8534db80 r10:61c88647 r9:855b8000 r8:8534dbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4896 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb401d84 r8:00000002 r7:60000013 r6:eb401d8c r5:855b8c00 r4:855b8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85343a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554978c r4:85549400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554978c r4:8534dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b8c00 r8:8534dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8534dc00 r8:80287e08 r7:eb3fde60 r6:85342f00 r5:855b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb401fb0 to 0xeb401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85343980 INFO: task kworker/0:527:4896 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:855b9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8532f6c0 r5:854edb8c r4:854ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854edb8c r4:85342f80 r10:61c88647 r9:855b9800 r8:85342fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85342f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85342f80 r8:80287e08 r7:eb3a9e60 r6:85344000 r5:855b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8532fe40 INFO: task kworker/1:362:4897 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b4538000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4900 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85549b8c r4:85549800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85549b8c r4:8534dc80 r4:8534dc80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:363:4902 blocked for more than 461 seconds. r4:855bb000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae59000 r5:854eff8c r4:854efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85344100 r8:80287e08 r7:eb3a9e60 r6:85344180 r5:855bb000 INFO: task kworker/1:363:4902 is blocked on a mutex likely owned by task kworker/0:296:4183. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b48cd000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4904 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:855bbc00 r4:855bbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85343ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554a38c r4:8554a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554a38c r4:8534dd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bbc00 r8:8534dd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8534dd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8534dd00 r8:80287e08 r7:eb3fde60 r6:85344200 r5:855bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85343b40 INFO: task kworker/0:529:4904 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b48cd000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4906 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:855bc800 r4:855bc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb443000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554af8c r4:8554ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554af8c r4:8534dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bc800 r8:8534ddac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4907 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:849fec00 r4:849fec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554a78c r4:8554a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554a78c r4:8534de00 r10:61c88647 r9:849fec00 r8:8534de2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85343480 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:364:4910 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854ee78c r4:854ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853302c0 r5:8554ab8c r4:8554a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8534df80 r8:80287e08 r7:eb425e60 r6:85344380 r5:855bd400 r4:85330280 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4915 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:855c0000 r4:855c0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554b78c r4:8554b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554b78c r4:85325000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c0000 r8:8532502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325000 r8:80287e08 r7:eb425e60 r6:85344400 r5:855c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853303c0 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 r5:00001000 r4:dfa09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:534:4916 blocked for more than 461 seconds. r4:855c0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r5:00001000 r4:eb449000 r5:8554b38c r4:8554b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85325080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325080 r8:80287e08 r7:eb459e60 r6:85344480 r5:855c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853303c0 INFO: task kworker/0:534:4916 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b59b0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4918 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:849fc800 r4:849fc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849fc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 r5:8554bb8c r4:8554b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554bb8c r4:85325100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85325100 r8:80287e08 r7:eb459e60 r6:85325180 r5:849fc800 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:536:4920 blocked for more than 461 seconds. r4:849fb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r5:00001000 r4:eb473000 r5:8554bf8c r4:8554bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554bf8c r4:85325200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849fb000 r8:8532522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325200 r8:80287e08 r7:eb439e60 r6:85325280 r5:849fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853305c0 INFO: task kworker/0:536:4920 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b625a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4922 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:849fbc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554c38c r4:8554c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849fbc00 r8:8532532c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849fd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r9:83018005 r8:849fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554cb8c r4:8554c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554cb8c r4:85325400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849fd400 r8:8532542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325400 r8:80287e08 r7:eb469e60 r6:85325480 r5:849fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85330a40 INFO: task kworker/0:538:4924 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b6a21000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4925 blocked for more than 461 seconds. r4:84a70000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554c78c r4:8554c400 r7:dddced80 r6:83018000 r5:8554c78c r4:85325500 r10:00000000 r9:85325500 r8:80287e08 r7:eb47de60 r6:85325580 r5:84a70000 INFO: task kworker/0:539:4925 is blocked on a mutex likely owned by task kworker/0:296:4183. dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4929 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb491d84 r8:00000002 r7:60000013 r6:eb491d8c r5:84a70c00 r4:84a70c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a70c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85330f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a70c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554cf8c r4:8554cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554cf8c r4:85325600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70c00 r8:8532562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325600 r8:80287e08 r7:eb47de60 r6:85325680 r5:84a70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85330d40 INFO: task kworker/0:540:4929 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b7569000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:84a71800 r4:8291a680 r4:00000000 r4:00000000 r5:8554df8c r4:8554dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554df8c r4:85325700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85325700 r8:80287e08 r7:eb491e60 r6:85325780 r5:84a71800 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4931 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:84a72400 r4:84a72400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a72400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a72400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554d38c r4:8554d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554d38c r4:85325800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a72400 r8:8532582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325800 r8:80287e08 r7:eb499e60 r6:85325880 r5:84a72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853da040 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a73c00 r5:84a73c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554d78c r4:8554d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554d78c r4:85325900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73c00 r8:8532592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325900 r8:80287e08 r7:eb499e60 r6:85325980 r5:84a73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853da180 INFO: task kworker/0:543:4934 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:544:4941 blocked for more than 461 seconds. r4:84a73000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r5:00001000 r4:eb4b5000 r5:8554db8c r4:8554d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85325a00 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: b7d3f000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4942 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000113 r6:eb4c9d8c r5:84a76000 r4:84a76000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a76000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554e38c r4:8554e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554e38c r4:85325b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76000 r8:85325b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325b00 r8:80287e08 r7:eb499e60 r6:85325b80 r5:84a76000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853da300 INFO: task kworker/0:545:4942 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b82db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4943 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:84a76c00 r4:84a76c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a76c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85354d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 r5:854eeb8c r4:854ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a76c00 r8:8534452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4944 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84a74800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554e78c r4:8554e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554e78c r4:85325c80 r4:85325c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b83a4000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:547:4945 blocked for more than 461 seconds. r4:847f0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r5:00001000 r4:eb5cd000 r5:8554eb8c r4:8554e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4947 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:847f1800 r4:847f1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ab540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554ef8c r4:8554ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554ef8c r4:85325e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f1800 r8:85325eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85325e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85325e80 r8:80287e08 r7:eb4d5e60 r6:85325f00 r5:847f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853daa00 INFO: task kworker/0:548:4947 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b8bc5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854eef8c r4:854eec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85344600 r8:80287e08 r7:eb415e60 r6:85325f80 r5:847f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85354700 INFO: task kworker/1:366:4948 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b8bc5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4950 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000013 r6:eb4e9d8c r5:847f0c00 r4:847f0c00 r5:847f0c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ef38c r4:854ef000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb4f1d84 r8:00000002 r7:60000013 r6:eb4f1d8c r5:847f3000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ef78c r4:854ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ef78c r4:85344580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f3000 r8:853445ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344580 r8:80287e08 r7:eb415e60 r6:853e6080 r5:847f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85354c40 INFO: task kworker/1:368:4952 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b9177000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:369:4954 blocked for more than 461 seconds. r4:847f3c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae27000 r5:854efb8c r4:854ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854efb8c r4:85344700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f3c00 r8:8534472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344700 r8:80287e08 r7:eb415e60 r6:853e6100 r5:847f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3000 INFO: task kworker/1:369:4954 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b96f5000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r9:83018205 r8:847f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:8558978c r4:85589400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847f4800 r8:853447ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b8b8c r4:847b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847b8b8c r4:85344800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f5400 r8:8534482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344800 r8:80287e08 r7:eb501e60 r6:853e6200 r5:847f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3440 INFO: task kworker/1:371:4958 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: b9d09000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4960 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb511d84 r8:00000002 r7:60000113 r6:eb511d8c r5:847f6000 r4:847f6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847f6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8558838c r4:85588000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847f6000 r8:853448ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r9:83018205 r8:847f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:8558878c r4:85588400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558878c r4:85344980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847f6c00 r8:853449ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344980 r8:80287e08 r7:eb501e60 r6:853e6300 r5:847f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3400 INFO: task kworker/1:373:4962 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ba2f8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r5:85588b8c r4:85588800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3800 r7:ddde2d80 r6:83018200 r5:85588f8c r4:85344a00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3640 INFO: task kworker/1:375:4966 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ba7b8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4969 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:855c4800 r4:855c4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e39c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558938c r4:85589000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558938c r4:85344b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c4800 r8:85344b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344b00 r8:80287e08 r7:eb501e60 r6:85344b80 r5:855c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3900 INFO: task kworker/1:376:4969 is blocked on a mutex likely owned by task kworker/0:296:4183. Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855c5400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85589f8c r4:85589c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:4972 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:855c6000 r4:855c6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e3c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85589b8c r4:85589800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85589b8c r4:85344d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6000 r8:85344d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344d00 r8:80287e08 r7:eb529e60 r6:85344d80 r5:855c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e3dc0 INFO: task kworker/1:378:4972 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: bb1d4000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r9:83018205 r8:855c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558a78c r4:8558a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558a78c r4:85344e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c6c00 r8:85344e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85344e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85344e00 r8:80287e08 r7:eb529e60 r6:85344e80 r5:855c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dac40 INFO: task kworker/1:379:4976 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bb1d4000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:4977 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:855c3c00 r4:855c3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853daec0 r5:8558a38c r4:8558a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558a38c r4:85344f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0013 r4:80239bb0 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 task:kworker/1:381 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8558b38c r4:8558b000 r10:61c88647 r9:855c2400 r8:8532702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4980 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:855c3000 r4:855c3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558ab8c r4:8558a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558ab8c r4:85327100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c3000 r8:8532712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327100 r8:80287e08 r7:eb539e60 r6:85327180 r5:855c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: bb914000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:855bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:8558af8c r4:8558ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85327200 r8:80287e08 r7:eb539e60 r6:85327280 r5:855bec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4984 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:855be000 r4:855be000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855be000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855be000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb361000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558b78c r4:8558b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558b78c r4:85327300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855be000 r8:8532732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327300 r8:80287e08 r7:eb539e60 r6:85327380 r5:855be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8200 INFO: task kworker/1:384:4984 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bbd02000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:855c8000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8558bb8c r4:8558b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558bb8c r4:85327400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c8000 r8:8532742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327400 r8:80287e08 r7:eb541e60 r6:85327480 r5:855c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d84c0 INFO: task kworker/1:385:4987 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bc23f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4989 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:855c8c00 r4:855c8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8558bf8c r4:8558bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8558bf8c r4:85327500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855c8c00 r8:8532752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327500 r8:80287e08 r7:eb545e60 r6:85327580 r5:855c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8640 INFO: task kworker/1:386:4989 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4990 blocked for more than 461 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:855c9800 r4:855c9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8559038c r4:85590000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559038c r4:85327600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85327600 r8:80287e08 r7:eb54de60 r6:85327680 r5:855c9800 INFO: task kworker/1:387:4990 is blocked on a mutex likely owned by task kworker/0:296:4183. Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559078c r4:85590400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8a40 INFO: task kworker/1:388:4994 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bc42a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4995 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:855cbc00 r4:855cbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855cbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85590b8c r4:85590800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85590b8c r4:85327800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cbc00 r8:8532782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327800 r8:80287e08 r7:eb561e60 r6:85327880 r5:855cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:eab2ddc0 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85523000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85523000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85523000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb571000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85590f8c r4:85590c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85590f8c r4:85327900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85523000 r8:8532792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327900 r8:80287e08 r7:eb555e60 r6:853e6400 r5:85523000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8a40 INFO: task kworker/1:390:4996 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bcb29000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:5000 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85520000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85354a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85520000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb57f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559138c r4:85591000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559138c r4:85327980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85520000 r8:853279ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327980 r8:80287e08 r7:eb569e60 r6:853e6480 r5:85520000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8f00 INFO: task kworker/1:391:5000 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bce2c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:392:5001 blocked for more than 462 seconds. r5:85524800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8559178c r4:85591400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85327a00 r8:80287e08 r7:eb589e60 r6:853e6500 r5:85524800 INFO: task kworker/1:392:5001 is blocked on a mutex likely owned by task kworker/0:296:4183. dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:85525400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85525400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb59b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85591b8c r4:85591800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85591b8c r4:85327a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85525400 r8:85327aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327a80 r8:80287e08 r7:eb58de60 r6:853e6580 r5:85525400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852d8e80 INFO: task kworker/1:393:5002 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bcf26000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5a1000 r5:85591f8c r4:85591c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85591f8c r4:85327b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85523c00 r8:85327b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327b00 r8:80287e08 r7:eb591e60 r6:853e6600 r5:85523c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b21c0 INFO: task kworker/1:394:5005 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bd23f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b2580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559278c r4:85592400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559278c r4:85327b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cd400 r8:85327bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb575d84 r8:00000002 r7:60000013 r6:eb575d8c r5:855ce000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8559238c r4:85592000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: bd7be000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85592b8c r4:85327d80 r10:61c88647 r9:855cec00 r8:85327dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85327d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85327d80 r8:80287e08 r7:eb57de60 r6:85327e00 r5:855cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b2540 INFO: task kworker/1:397:5011 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bd99f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8559338c r4:85593000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r9:83018205 r8:855d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 r5:8559378c r4:85593400 r10:61c88647 r9:855d0000 r8:85327fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:5016 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:85526c00 r4:85526c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85526c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ab880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85526c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8554f78c r4:8554f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8554f78c r4:853e6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85526c00 r8:853e66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e6680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e6680 r8:80287e08 r7:eb4dde60 r6:853e6700 r5:85526c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab680 INFO: task kworker/0:549:5016 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bdbf9000 eab7b000 00000001 80239b98 7f2c5000 00000001 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85592f8c r4:85592c00 r10:61c88647 r9:85526000 r8:853e67ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: be332000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:5024 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:85521800 r4:85521800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85521800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852abb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85521800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r5:8554ff8c r4:8554fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85521800 r8:853e68ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8554fb8c r4:8554f800 r4:853e6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e6980 r8:80287e08 r7:eb5ede60 r6:853e6a00 r5:85522400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab8c0 INFO: task kworker/0:552:5025 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: be669000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:5027 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:400 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:84a75400 r4:84a75400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a75400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ce140 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85593f8c r4:85593c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852a5100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: be6c3000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:855d8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r5:00001000 r4:eaf0b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852a5180 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: be6c3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:5030 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:855d8c00 r4:855d8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852abe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b8f8c r4:847b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853e6b80 r8:80287e08 r7:eb5ede60 r6:853e6c00 r5:855d8c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1380 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855d9800 r8:853e6cac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:5034 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000013 r6:eb605d8c r5:855da400 r4:855da400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855da400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b2b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855da400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556478c r4:85564400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556478c r4:853e6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855da400 r8:853e6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e6d80 r8:80287e08 r7:eb60de60 r6:853e6e00 r5:855da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ab380 INFO: task kworker/0:555:5034 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bed6e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85564b8c r4:85564800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853e6e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85564f8c r4:85564c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85564f8c r4:853e6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dc800 r8:853e6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e6f80 r8:80287e08 r7:eb615e60 r6:852cc000 r5:855dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c5180 INFO: task kworker/0:557:5038 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bf24e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:5040 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:855de000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r5:00001000 r4:eb453000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:855de000 r8:852a522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:855dbc00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb113000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556578c r4:85565400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556578c r4:852cc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855dbc00 r8:852cc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc100 r8:80287e08 r7:eb611e60 r6:852cc180 r5:855dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c54c0 INFO: task kworker/0:558:5043 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bf4a0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:403 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r9:83018205 r8:855dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:852a5280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:559:5046 blocked for more than 462 seconds. r4:84b08c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85565b8c r4:85565800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85565b8c r4:852cc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08c00 r8:852cc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc280 r8:80287e08 r7:eb629e60 r6:852cc300 r5:84b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c5940 INFO: task kworker/0:559:5046 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bfc76000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:404:5047 blocked for more than 462 seconds. r5:84b09800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:8559c38c r4:852a5300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r5:84b0a400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b0a400 r8:852cc42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:560:5050 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: bfd5b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:5052 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:84b08000 r4:84b08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb257000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85565f8c r4:85565c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85565f8c r4:852cc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b08000 r8:852cc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc500 r8:80287e08 r7:eb63de60 r6:852cc580 r5:84b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: bfd5b000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r4:eab2ddc0 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5058 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb649d84 r8:00000002 r7:60000013 r6:eb649d8c r5:84b0b000 r4:84b0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ac300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85566b8c r4:85566800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85566b8c r4:852cc780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0b000 r8:852cc7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc780 r8:80287e08 r7:eb645e60 r6:852cc800 r5:84b0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ac100 INFO: task kworker/0:563:5058 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c0ae0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfa09000 r4:85249480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:564:5060 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb61dd84 r8:00000002 r7:60000013 r6:eb61dd8c r5:84b0e000 r4:84b0e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ac400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85566f8c r4:85566c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85566f8c r4:852cc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0e000 r8:852cc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cc880 r8:80287e08 r7:eb649e60 r6:852cc900 r5:84b0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:564:5060 is blocked on a mutex likely owned by task kworker/0:296:4183. dd20: c0f82000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84b0ec00 r8:852cc9ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5063 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5063 tgid:5063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000113 r6:eb655d8c r5:84b0c800 r4:84b0c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b0c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ac740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8556778c r4:85567400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8556778c r4:852cca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b0c800 r8:852ccaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852cca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cca80 r8:80287e08 r7:eb651e60 r6:852ccb00 r5:84b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ac680 INFO: task kworker/0:566:5063 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c0f82000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855dd400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852ccb80 r8:80287e08 r7:eb655e60 r6:852ccc00 r5:855dd400 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aca40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85567f8c r4:85567c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85567f8c r4:852ccc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c0000 r8:852cccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ccc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ccc80 r8:80287e08 r7:eb659e60 r6:852ccd00 r5:849c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ac840 INFO: task kworker/0:568:5068 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c14ba000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:5069 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:849c1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb619e08 r5:00001000 r4:eb431000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559c78c r4:8559c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559c78c r4:852ccd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c1800 r8:852ccdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ccd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ccd80 r8:80287e08 r7:eb65de60 r6:852cce00 r5:849c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852aca00 INFO: task kworker/0:569:5069 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:855d2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:406:5075 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:406 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb661d84 r8:00000002 r7:60000113 r6:eb661d8c r5:855d3c00 r4:855d3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb661e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85409f40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559eb8c r4:8559e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559eb8c r4:852a5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d3c00 r8:852a54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5480 r8:80287e08 r7:eb625e60 r6:852a5500 r5:855d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852cebc0 INFO: task kworker/1:406:5075 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c172a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb669fb0 to 0xeb669ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:5078 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:855d5400 r4:855d5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c52c0 r4:00000000 r5:00001000 r4:eb475000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557478c r4:85574400 r10:61c88647 r9:855d5400 r8:852ccf2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:855d6000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c5dc0 INFO: task kworker/0:572:5080 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c1f9d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:5082 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:855d3000 r4:855d3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3140 r4:00000000 r9:83018005 r8:855d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb685d84 r8:00000002 r7:60000013 r6:eb685d8c r5:855d1800 r4:855d1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b32c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557538c r4:85575000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852b7080 r8:80287e08 r7:eb67de60 r6:852a5800 r5:855d1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:855d0c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:852b7100 r8:80287e08 r7:eb685e60 r6:852a5880 r5:855d0c00 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:855cc800 r4:855cc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855cc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557578c r4:85575400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557578c r4:852b7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cc800 r8:852b71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7180 r8:80287e08 r7:eb68de60 r6:852a5900 r5:855cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b3200 INFO: task kworker/0:576:5087 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c296f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r5:800f0013 r4:80239bb0 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5091 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:855e0000 r4:855e0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557638c r4:85576000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557638c r4:852b7280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e0000 r8:852b72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7280 r8:80287e08 r7:eb68de60 r6:852a5a00 r5:855e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b37c0 INFO: task kworker/0:578:5091 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e1d84 r8:00000002 r7:60000113 r6:eb6e1d8c r5:855e2400 r4:855e2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b39c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85576b8c r4:85576800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85576b8c r4:852b7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e2400 r8:852b73ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7380 r8:80287e08 r7:eb6bde60 r6:852a5b00 r5:855e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b3a00 INFO: task kworker/0:580:5098 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: c3319000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5099 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:855e3000 r4:855e3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85576f8c r4:85576c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85576f8c r4:852b7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e3000 r8:852b742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7400 r8:80287e08 r7:eb6e1e60 r6:852a5b80 r5:855e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b3a00 INFO: task kworker/0:581:5099 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c3616000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:5101 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6f1d84 r8:00000002 r7:60000113 r6:eb6f1d8c r5:855e3c00 r4:855e3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557738c r4:85577000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557738c r4:852b7480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e3c00 r8:852b74ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7480 r8:80287e08 r7:eb6e5e60 r6:852a5c00 r5:855e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b3b40 INFO: task kworker/0:582:5101 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c3616000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5103 blocked for more than 462 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:855e4800 r4:855e4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cefc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85577b8c r4:85577800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85577b8c r4:852b7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e4800 r8:852b752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7500 r8:80287e08 r7:eb6f1e60 r6:852a5c80 r5:855e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb701fb0 to 0xeb701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b3c40 INFO: task kworker/0:583:5103 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c3a03000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5105 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5105 tgid:5105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:855e6c00 r4:855e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b3dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557778c r4:85577400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557778c r4:852b7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6c00 r8:852b75ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7580 r8:80287e08 r7:eb701e60 r6:852a5d00 r5:855e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ce7c0 INFO: task kworker/0:584:5105 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c3a03000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5106 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb719d84 r8:00000002 r7:60000013 r6:eb719d8c r5:855d6c00 r4:855d6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855d6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852acac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85577f8c r4:85577c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85577f8c r4:852b7600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855d6c00 r8:852b762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7600 r8:80287e08 r7:eb701e60 r6:852a5d80 r5:855d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852acf40 INFO: task kworker/0:585:5106 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c3a03000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:5108 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:855e8c00 r4:855e8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c5780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb715000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557838c r4:85578000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557838c r4:852b7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8c00 r8:852b76ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7680 r8:80287e08 r7:eb719e60 r6:852a5e00 r5:855e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852acf40 INFO: task kworker/0:586:5108 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c4164000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5109 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb729d84 r8:00000002 r7:60000113 r6:eb729d8c r5:855e9800 r4:855e9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb735000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559d38c r4:8559d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8559d38c r4:852b7700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e9800 r8:852b772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7700 r8:80287e08 r7:eb721e60 r6:852a5e80 r5:855e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c50c0 INFO: task kworker/0:587:5109 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c4164000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557878c r4:85578400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557878c r4:852b7780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e8000 r8:852b77ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7780 r8:80287e08 r7:eb729e60 r6:852a5f00 r5:855e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85400080 INFO: task kworker/0:588:5111 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c4785000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfa0: 00000000 00000000 00000000 00000000 r4:85243840 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:849c3c00 r5:849c3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854003c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85578b8c r4:85578800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85578b8c r4:852b7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c3c00 r8:852b782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7800 r8:80287e08 r7:eb729e60 r6:852b7880 r5:849c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854001c0 INFO: task kworker/0:589:5114 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c4986000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:408:5116 blocked for more than 463 seconds. r5:849c2400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852a5f80 r8:80287e08 r7:eb661e60 r6:852b7900 r5:849c2400 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:590:5118 blocked for more than 463 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:849c5400 r4:849c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854005c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85578f8c r4:85578c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85578f8c r4:852b7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c5400 r8:852b79ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7980 r8:80287e08 r7:eb679e60 r6:852b7a00 r5:849c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85400380 INFO: task kworker/0:590:5118 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c4986000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:849c0c00 r4:849c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854008c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea87f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557978c r4:85579400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557978c r4:852b7a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c0c00 r8:852b7aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7a80 r8:80287e08 r7:eb751e60 r6:852b7b00 r5:849c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:849c6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85579b8c r4:85579800 r7:dddced80 r6:83018000 r5:85579b8c r4:852b7b80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:409:5125 blocked for more than 463 seconds. task:kworker/1:409 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:849c3000 r4:849c3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559df8c r4:8559dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559df8c r4:852a5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c3000 r8:852a50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852a5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a5080 r8:80287e08 r7:eb661e60 r6:852b7c80 r5:849c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85318b00 INFO: task kworker/1:409:5125 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c52ba000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb755d84 r8:00000002 r7:60000013 r6:eb755d8c r5:849c4800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85579f8c r4:85579c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85579f8c r4:852b7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c4800 r8:852b7d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7d00 r8:80287e08 r7:eb2cde60 r6:852b7d80 r5:849c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85400dc0 INFO: task kworker/0:593:5127 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c5865000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r9:83018205 r8:85538000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:8564038c r4:85640000 r7:ddde2d80 r6:83018200 r5:8564038c r4:853dc000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85539800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:8557a38c r4:8557a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557a38c r4:852b7e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85539800 r8:852b7eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7e80 r8:80287e08 r7:eb755e60 r6:852b7f00 r5:85539800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85400f80 INFO: task kworker/0:594:5132 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c5d52000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:5133 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb759d84 r8:00000002 r7:60000113 r6:eb759d8c r5:8553a400 r4:8553a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854071c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb029000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557ab8c r4:8557a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557ab8c r4:852b7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553a400 r8:852b7fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852b7f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b7f80 r8:80287e08 r7:eb51de60 r6:853f3000 r5:8553a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85400f80 INFO: task kworker/0:595:5133 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c5d52000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:5134 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:855eb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r9:83018005 r8:855eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:8557a78c r4:8557a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557a78c r4:853f3080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855eb000 r8:853f30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3080 r8:80287e08 r7:eb759e60 r6:853dc080 r5:855eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1a00 INFO: task kworker/0:596:5134 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c5d52000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:5137 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:855ed400 r4:855ed400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ed400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb079000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557af8c r4:8557ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557af8c r4:853f3100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ed400 r8:853f312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3100 r8:80287e08 r7:eb759e60 r6:853dc100 r5:855ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407440 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:82ac21e4 r4:eab2ddc0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5139 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:855ee000 r4:855ee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854073c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557b38c r4:8557b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557b38c r4:853f3180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ee000 r8:853f31ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3180 r8:80287e08 r7:eb761e60 r6:853dc180 r5:855ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb765fb0 to 0xeb765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854072c0 INFO: task kworker/0:598:5139 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c632d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:5141 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:855eec00 r4:855eec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855eec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557b78c r4:8557b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557b78c r4:853f3200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855eec00 r8:853f322c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3200 r8:80287e08 r7:eb765e60 r6:853dc200 r5:855eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407240 INFO: task kworker/0:599:5141 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c632d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85249480 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5143 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000013 r6:eb76dd8c r5:855ec800 r4:855ec800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ec800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854076c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557bb8c r4:8557b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557bb8c r4:853f3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ec800 r8:853f32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3280 r8:80287e08 r7:eb769e60 r6:853dc280 r5:855ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854075c0 INFO: task kworker/0:600:5143 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c6795000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:5145 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb771d84 r8:00000002 r7:60000013 r6:eb771d8c r5:855ebc00 r4:855ebc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ebc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557bf8c r4:8557bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557bf8c r4:853f3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ebc00 r8:853f332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3300 r8:80287e08 r7:eb76de60 r6:853dc300 r5:855ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb771fb0 to 0xeb771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407700 INFO: task kworker/0:601:5145 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c6d82000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5147 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:855ea400 r4:855ea400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ea400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb359000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564078c r4:85640400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564078c r4:853f3400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ea400 r8:853f342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3400 r8:80287e08 r7:eb771e60 r6:853dc380 r5:855ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407740 INFO: task kworker/0:602:5147 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c6d82000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:5150 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000013 r6:eb72dd8c r5:8553bc00 r4:8553bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640b8c r4:85640800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640b8c r4:853f3380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553bc00 r8:853f33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3380 r8:80287e08 r7:eb775e60 r6:853f3480 r5:8553bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407ac0 INFO: task kworker/0:603:5150 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c7212000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:5152 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:849c6c00 r4:849c6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849c6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85407d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb397000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640f8c r4:85640c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640f8c r4:853f3500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849c6c00 r8:853f352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3500 r8:80287e08 r7:eb72de60 r6:853dc400 r5:849c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407ec0 INFO: task kworker/0:604:5152 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c73ef000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:5154 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:855e6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 r5:00001000 r4:eb4bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564138c r4:85641000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564138c r4:853f3580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e6000 r8:853f35ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3580 r8:80287e08 r7:eb781e60 r6:853dc480 r5:855e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407d40 INFO: task kworker/0:605:5154 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c73ef000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:5156 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:85680c00 r4:85680c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85680c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8564238c r4:85642000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564238c r4:853f3600 r10:61c88647 r9:85680c00 r8:853f362c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:853f3600 r8:80287e08 r7:eb789e60 r6:853dc580 r5:85680c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c7862000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:5157 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:85681800 r4:85681800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85681800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85681800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559e38c r4:8559e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85681800 r8:853dc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85682400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4e3000 r5:8564178c r4:85641400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:5160 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:85680000 r4:85680000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d66c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85680000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641b8c r4:85641800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85641b8c r4:853f3700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680000 r8:853f372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3700 r8:80287e08 r7:eb791e60 r6:853dc700 r5:85680000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85407fc0 INFO: task kworker/0:608:5160 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c832a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:5162 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:85683000 r4:85683000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85683000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85409e40 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559e78c r4:8559e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85683000 r8:853dc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85402d40 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85683c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r5:85641f8c r4:85641c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:853f3780 r8:80287e08 r7:eb791e60 r6:853dc880 r5:85683c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:5166 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:85684800 r4:85684800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85684800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85684800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb579000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85642f8c r4:85642c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85642f8c r4:853f3800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85684800 r8:853f382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3800 r8:80287e08 r7:eb791e60 r6:853dc900 r5:85684800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85421280 INFO: task kworker/0:610:5166 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85685400 r4:8291a680 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8564278c r4:853f3880 r10:00000000 r9:853f3880 r8:80287e08 r7:eb7b5e60 r6:853dc980 r5:85685400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:5171 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c1d84 r8:00000002 r7:60000013 r6:eb7c1d8c r5:85686c00 r4:85686c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854213c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85686c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85642b8c r4:85642800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85642b8c r4:853f3900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686c00 r8:853f392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3900 r8:80287e08 r7:eb7b5e60 r6:853dca00 r5:85686c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854214c0 INFO: task kworker/0:612:5171 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c8926000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:5173 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:5173 tgid:5173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000113 r6:eb7c5d8c r5:85686000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8564338c r4:85643000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85686000 r8:853f39ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:5175 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000013 r6:eb7c9d8c r5:855e5400 r4:855e5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855e5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854218c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643b8c r4:85643800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85643b8c r4:853f3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855e5400 r8:853f3a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3a00 r8:80287e08 r7:eb7c5e60 r6:853dcb00 r5:855e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85421740 INFO: task kworker/0:614:5175 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c9269000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8564378c r4:85643400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ab0000 r8:853f3aac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5179 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:84ab0c00 r4:84ab0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f015000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643f8c r4:85643c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85643f8c r4:853f3b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab0c00 r8:853f3b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3b00 r8:80287e08 r7:eb7c9e60 r6:853dcc00 r5:84ab0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85421800 INFO: task kworker/0:616:5179 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84ab1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564838c r4:85648000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564838c r4:853f3b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab1800 r8:853f3bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3b80 r8:80287e08 r7:eb7d1e60 r6:853dcc80 r5:84ab1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85421a00 INFO: task kworker/0:617:5181 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: c9824000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:618:5183 blocked for more than 463 seconds. r10:8291a684 r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:84ab2400 r4:84ab2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85648b8c r4:85648800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85648b8c r4:853f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab2400 r8:853f3c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3c00 r8:80287e08 r7:eb69de60 r6:853dcd00 r5:84ab2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85421b40 INFO: task kworker/0:618:5183 is blocked on a mutex likely owned by task kworker/0:296:4183. Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:619:5185 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:84ab3000 r4:84ab3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85421d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564878c r4:85648400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564878c r4:853f3c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab3000 r8:853f3cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3c80 r8:80287e08 r7:eb6a1e60 r6:853dcd80 r5:84ab3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85648f8c r4:85648c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85648f8c r4:853f3d00 r4:853f3d00 Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:5189 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:84ab4800 r4:84ab4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85649b8c r4:85649800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85649b8c r4:853f3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab4800 r8:853f3dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3d80 r8:80287e08 r7:eb6b5e60 r6:853dce80 r5:84ab4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402cc0 INFO: task kworker/0:621:5189 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ca0df000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:622 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564938c r4:85649000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853f3e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:623 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r5:00001000 r4:eb107000 r5:85649f8c r4:85649c00 r7:dddced80 r6:83018000 r5:85649f8c r4:853f3e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608000 r8:853f3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3e80 r8:80287e08 r7:eb6c9e60 r6:853dcf80 r5:85608000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854101c0 INFO: task kworker/0:623:5195 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ca497000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:5196 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb705d84 r8:00000002 r7:60000013 r6:eb705d8c r5:85608c00 r4:85608c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85608c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85608c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564a78c r4:8564a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564a78c r4:853f3f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85608c00 r8:853f3f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3f00 r8:80287e08 r7:eb6fde60 r6:85422000 r5:85608c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410280 INFO: task kworker/0:624:5196 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ca77c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb211000 r5:8564a38c r4:8564a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85609800 r8:853f3fac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:5199 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:5199 tgid:5199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000013 r6:eb7d9d8c r5:8560a400 r4:8560a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854107c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560a400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564ab8c r4:8564a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564ab8c r4:85414000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560a400 r8:8541402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414000 r8:80287e08 r7:eb705e60 r6:85422100 r5:8560a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410400 INFO: task kworker/0:626:5199 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: caf22000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8560b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559f78c r4:8559f400 r7:ddde2d80 r6:83018200 r5:8559f78c r4:85422180 r10:00000000 r9:85422180 r8:80287e08 r7:eb661e60 r6:85422200 r5:8560b000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:5204 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:8560bc00 r4:8560bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f6680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8559ef8c r4:8559ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8559ef8c r4:85422280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560bc00 r8:854222ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8560c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r5:8564af8c r4:8564ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:628 state:D stack:0 pid:5208 tgid:5208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:8560d400 r4:8560d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560d400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb411000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564b38c r4:8564b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564b38c r4:85414100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560d400 r8:8541412c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414100 r8:80287e08 r7:eb7dde60 r6:85422400 r5:8560d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410940 INFO: task kworker/0:628:5208 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cb5ab000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:5210 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:8560ec00 r4:8560ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8560ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8560ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb429000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564b78c r4:8564b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564b78c r4:85414180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8560ec00 r8:854141ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414180 r8:80287e08 r7:eb7e1e60 r6:85422480 r5:8560ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410a00 INFO: task kworker/0:629:5210 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cbe72000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:5212 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000013 r6:eb7f9d8c r5:84ab6000 r4:84ab6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ab6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564bb8c r4:8564b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564bb8c r4:85414200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ab6000 r8:8541422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414200 r8:80287e08 r7:eb7f1e60 r6:85422500 r5:84ab6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410b80 INFO: task kworker/0:630:5212 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cbe72000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:5214 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:85610000 r4:85610000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85610000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f53c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85610000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564db8c r4:8564d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564db8c r4:85414280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85610000 r8:854142ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414280 r8:80287e08 r7:eb7f9e60 r6:85422580 r5:85610000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410c40 INFO: task kworker/0:631:5214 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cbe72000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:5216 blocked for more than 463 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb809d84 r8:00000002 r7:60000013 r6:eb809d8c r5:85611800 r4:85611800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85611800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85611800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb451000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564bf8c r4:8564bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564bf8c r4:85414300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85611800 r8:8541432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414300 r8:80287e08 r7:eb801e60 r6:85422600 r5:85611800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb809fb0 to 0xeb809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410f40 INFO: task kworker/0:632:5216 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cc8f4000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:5217 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:85612400 r4:85612400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85612400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85612400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564c38c r4:8564c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564c38c r4:85414380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85612400 r8:854143ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414380 r8:80287e08 r7:eb801e60 r6:85422680 r5:85612400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85410dc0 INFO: task kworker/0:633:5217 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cc999000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:5219 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:85610c00 r4:85610c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85610c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85402640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85610c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564c78c r4:8564c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564c78c r4:85414400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85610c00 r8:8541442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414400 r8:80287e08 r7:eb801e60 r6:85422700 r5:85610c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402d40 INFO: task kworker/0:634:5219 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cc999000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:5221 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb81dd84 r8:00000002 r7:60000113 r6:eb81dd8c r5:85614800 r4:85614800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85614800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb81de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85614800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb495000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564cb8c r4:8564c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564cb8c r4:85414480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85614800 r8:854144ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414480 r8:80287e08 r7:eb801e60 r6:85422780 r5:85614800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb81dfb0 to 0xeb81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85402d40 INFO: task kworker/0:635:5221 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ccf5d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:5224 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:5224 tgid:5224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb829d84 r8:00000002 r7:60000113 r6:eb829d8c r5:85616000 r4:85616000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85616000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85616000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564cf8c r4:8564cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564cf8c r4:85414500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85616000 r8:8541452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414500 r8:80287e08 r7:eb801e60 r6:85422800 r5:85616000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f5100 INFO: task kworker/0:636:5224 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cd38f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:5225 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:5225 tgid:5225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb851d84 r8:00000002 r7:60000113 r6:eb851d8c r5:85613000 r4:85613000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85613000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85613000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564d38c r4:8564d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564d38c r4:85414580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85613000 r8:854145ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414580 r8:80287e08 r7:eb801e60 r6:85422880 r5:85613000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f52c0 INFO: task kworker/0:637:5225 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cd8ca000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85243840 task:kworker/0:638 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8564d78c r4:8564d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85414600 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:639:5230 blocked for more than 464 seconds. r4:85613c00 r4:00000000 r4:00000000 r5:00001000 r4:eb5e7000 r5:8564df8c r4:8564dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564df8c r4:85414680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85613c00 r8:854146ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414680 r8:80287e08 r7:eb801e60 r6:85422980 r5:85613c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f5240 INFO: task kworker/0:639:5230 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ce0a7000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:640:5232 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:85616c00 r4:85616c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85616c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85616c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 r5:8564e78c r4:8564e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564e78c r4:85414700 r4:85414700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564e38c r4:8564e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564e38c r4:85414780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85618000 r8:854147ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414780 r8:80287e08 r7:eb875e60 r6:85422a80 r5:85618000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f5540 INFO: task kworker/0:641:5233 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ce76e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:642:5236 blocked for more than 464 seconds. r4:8561a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8564ef8c r4:85414800 Exception stack(0xeb885fb0 to 0xeb885ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85619800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8564eb8c r4:8564e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85414880 r8:80287e08 r7:eb885e60 r6:85422b80 r5:85619800 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:5240 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:8561bc00 r4:8561bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8561bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb695000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564f38c r4:8564f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564f38c r4:85414900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561bc00 r8:8541492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414900 r10:00000000 r9:85414900 r8:80287e08 r7:eb885e60 r6:85422c00 r5:8561bc00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8561b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r5:8564ff8c r4:8564fc00 r7:dddced80 r6:83018000 r5:8564ff8c r4:85414980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb8a9d84 r8:00000002 r7:60000013 r6:eb8a9d8c r5:8561d400 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f5c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8561d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564f78c r4:8564f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564f78c r4:85414a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561d400 r8:85414a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414a00 r8:80287e08 r7:eb8a5e60 r6:85422d00 r5:8561d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f5b40 INFO: task kworker/0:646:5244 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cf1b7000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:5245 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:8561c800 r4:8561c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8561c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:8564fb8c r4:8564f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) task:kworker/0:648 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85650b8c r4:85650800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650b8c r4:85414b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561ec00 r8:85414b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414b00 r8:80287e08 r7:eb8a5e60 r6:85422e00 r5:8561ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541fc40 INFO: task kworker/0:648:5247 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cfc4e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:5249 blocked for more than 464 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8561e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8565038c r4:85650000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565038c r4:85414b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8561e000 r8:85414bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414b80 r8:80287e08 r7:eb8b5e60 r6:85422e80 r5:8561e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f5f00 INFO: task kworker/0:649:5249 is blocked on a mutex likely owned by task kworker/0:296:4183. Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8559ff8c r4:8559fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred r5:85615400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb709000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565078c r4:85650400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565078c r4:85414c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85615400 r8:85414c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414c00 r8:80287e08 r7:eb8b5e60 r6:856fe000 r5:85615400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fa100 INFO: task kworker/0:650:5254 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: cffc6000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Not tainted 6.15.0-rc6-syzkaller #0 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa400 r5:8565138c r4:85651000 r10:61c88647 r9:85620c00 r8:85414cac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85620000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r5:00001000 r4:eb725000 r5:85650f8c r4:85650c00 r10:61c88647 r9:85620000 r8:85414d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414d00 r8:80287e08 r7:eb8c9e60 r6:856fe100 r5:85620000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fa300 INFO: task kworker/0:652:5258 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d05c9000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:5259 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:5259 tgid:5259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85622400 r4:00000000 r9:83018005 r8:85622400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 r5:8565338c r4:85653000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85622400 r8:85414dac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:654:5262 blocked for more than 464 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85621800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb743000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565178c r4:85651400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565178c r4:85414e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85621800 r8:85414e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414e00 r8:80287e08 r7:eb8e5e60 r6:856fe200 r5:85621800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fa440 INFO: task kworker/0:654:5262 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d0980000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85623000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r5:85651b8c r4:85651800 r7:dddced80 r6:83018000 r5:85651b8c r4:85414e80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfa09000 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa800 r5:85651f8c r4:85651c00 r7:dddced80 r6:83018000 r5:85651f8c r4:85414f00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d0b97000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:5267 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec10dd84 r8:00000002 r7:60000013 r6:ec10dd8c r5:85624800 r4:85624800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85624800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec10de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856fa900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85624800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea805000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565238c r4:85652000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565238c r4:85414f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85624800 r8:85414fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85414f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85414f80 r8:80287e08 r7:eb8e5e60 r6:856fe380 r5:85624800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec10dfb0 to 0xec10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856faa80 INFO: task kworker/0:657:5267 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:658:5269 blocked for more than 464 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856faac0 r5:8565278c r4:85652400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565278c r4:85708000 r4:85708000 Exception stack(0xec115fb0 to 0xec115ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:659:5271 blocked for more than 464 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85652b8c r4:85652800 r7:dddced80 r6:83018000 r5:85652b8c r4:85708080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:5273 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:8553e000 r4:8553e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856facc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553e000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652f8c r4:85652c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85652f8c r4:85708100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553e000 r8:8570812c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85708100 r8:80287e08 r7:eb8e5e60 r6:85708180 r5:8553e000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:661:5277 blocked for more than 464 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8553ec00 r8:8570822c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5278 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:5278 tgid:5278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec12dd84 r8:00000002 r7:60000013 r6:ec12dd8c r5:8553c800 r4:8553c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8553c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85653f8c r4:85653c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570e000 INFO: task kworker/0:662:5278 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d156e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:663:5280 blocked for more than 464 seconds. r5:8553d400 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85708400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:5282 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:664 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec135d84 r8:00000002 r7:60000013 r6:ec135d8c r5:85538c00 r4:85538c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85538c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec135e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570e600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85538c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb337000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565838c r4:85658000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85538c00 r8:8570852c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:665:5285 blocked for more than 464 seconds. r4:84ab6c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec141e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85658b8c r4:85658800 r10:00000000 r9:85708600 r8:80287e08 r7:ec135e60 r6:85708680 r5:84ab6c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:8553b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec131e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570e700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8553b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565878c r4:85658400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565878c r4:85708700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8553b000 r8:8570872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85708700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85708700 r8:80287e08 r7:ec141e60 r6:85708780 r5:8553b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec131fb0 to 0xec131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570e5c0 INFO: task kworker/0:666:5287 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d223e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85688c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85658f8c r4:85658c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85688c00 r8:8570882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8570e980 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:668:5292 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:668 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec155d84 r8:00000002 r7:60000013 r6:ec155d8c r5:85689800 r4:85689800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85689800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec155e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85719040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85689800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85659b8c r4:85659800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85659b8c r4:85708900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85689800 r8:8570892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85708900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85708900 r8:80287e08 r7:ec151e60 r6:85708980 r5:85689800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec155fb0 to 0xec155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570eb00 INFO: task kworker/0:668:5292 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d2859000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:85272b8c r4:85272800 r4:85249480 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:669 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec159e08 r9:83018005 r8:8568a400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r5:8565938c r4:85659000 r7:dddced80 r6:83018000 r5:8565938c r4:85708a00 r10:61c88647 r9:8568a400 r8:85708a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:670:5295 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:670 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec15dd84 r8:00000002 r7:60000013 r6:ec15dd8c r5:8568bc00 r4:8568bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec15de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570ed40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8568bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb503000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565978c r4:85659400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565978c r4:85708b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568bc00 r8:85708b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85708b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85708b00 r8:80287e08 r7:ec155e60 r6:85708b80 r5:8568bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec15dfb0 to 0xec15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570ed00 INFO: task kworker/0:670:5295 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d2859000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:5297 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec165d84 r8:00000002 r7:60000113 r6:ec165d8c r5:8568b000 r4:8568b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec165e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571be80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8566238c r4:85662000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8568b000 r8:856fe52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d2859000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:5299 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec169d84 r8:00000002 r7:60000013 r6:ec169d8c r5:85688000 r4:85688000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85688000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec169e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857192c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85688000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:85659f8c r4:85659c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85659f8c r4:85708c80 r10:61c88647 r9:85688000 r8:85708cac r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:5301 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565a38c r4:8565a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565a38c r4:85708d80 r4:85708d80 dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8568d400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8565a78c r4:8565a400 r7:dddced80 r6:83018000 r5:8565a78c r4:85708e80 r10:00000000 r9:85708e80 r8:80287e08 r7:ec16de60 r6:85708f00 r5:8568d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec171fb0 to 0xec171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857190c0 INFO: task kworker/0:673:5303 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d364d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:5306 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec161d84 r8:00000002 r7:60000113 r6:ec161d8c r5:8568ec00 r4:8568ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec161e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565ab8c r4:8565a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565ab8c r4:85708f80 r10:61c88647 r9:8568ec00 r8:85708fac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d364d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:5307 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec14dd84 r8:00000002 r7:60000113 r6:ec14dd8c r5:8568c800 r4:8568c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec14de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:8565af8c r4:8565ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565af8c r4:8571e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8571e080 r8:80287e08 r7:ec161e60 r6:8571e100 r5:8568c800 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfa09000 r4:85249480 r4:00000001 r4:85243840 Workqueue: events bpf_prog_free_deferred r5:847a0000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb7a9000 r5:8565b38c r4:8565b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:5312 blocked for more than 464 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec17dd84 r8:00000002 r7:60000113 r6:ec17dd8c r5:847a0c00 r4:847a0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847a0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec17de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85719c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565b78c r4:8565b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565b78c r4:8571e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a0c00 r8:8571e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e280 r8:80287e08 r7:ec175e60 r6:8571e300 r5:847a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec17dfb0 to 0xec17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:678 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec179d84 r8:00000002 r7:60000013 r6:ec179d8c r5:847a1800 r4:847a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec179e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85719e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565bb8c r4:8565b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565bb8c r4:8571e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a1800 r8:8571e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e380 r8:80287e08 r7:ec17de60 r6:8571e400 r5:847a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec179fb0 to 0xec179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85719b80 INFO: task kworker/0:678:5313 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d4422000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 task:kworker/0:679 state:D stack:0 pid:5315 tgid:5315 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8566038c r4:85660000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566038c r4:8571e480 r4:8571e480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:680:5316 blocked for more than 465 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec185d84 r8:00000002 r7:60000113 r6:ec185d8c r5:847a3000 r4:847a3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847a3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec185e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856faf80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565bf8c r4:8565bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565bf8c r4:8571e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a3000 r8:8571e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e580 r8:80287e08 r7:ec181e60 r6:8571e600 r5:847a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec185fb0 to 0xec185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fae40 INFO: task kworker/0:680:5316 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d49e1000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:681:5319 blocked for more than 465 seconds. r4:847a3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec189e08 r9:83018005 r8:847a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8566078c r4:85660400 r7:dddced80 r6:83018000 r5:8566078c r4:8571e680 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:5321 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:5321 tgid:5321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec18dd84 r8:00000002 r7:60000113 r6:ec18dd8c r5:847a4800 r4:847a4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847a4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec18de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec195000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85660b8c r4:85660800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85660b8c r4:8571e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a4800 r8:8571e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e780 r8:80287e08 r7:ec189e60 r6:8571e800 r5:847a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec18dfb0 to 0xec18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727100 INFO: task kworker/0:682:5321 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d545e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:847a5400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85660f8c r4:85660c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:847a5400 r8:8571e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e880 r8:80287e08 r7:ec18de60 r6:8571e900 r5:847a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec199fb0 to 0xec199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857272c0 INFO: task kworker/0:683:5323 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d545e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566178c r4:85661400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566178c r4:8571e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a6000 r8:8571e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571e980 r8:80287e08 r7:ec199e60 r6:8571ea00 r5:847a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec1a1fb0 to 0xec1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727480 INFO: task kworker/0:684:5325 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:685:5328 blocked for more than 465 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8566138c r4:85661000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566138c r4:8571ea80 r10:61c88647 r9:8562a400 r8:8571eaac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85661b8c r4:85661800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85661b8c r4:8571eb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85629800 r8:8571eb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571eb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571eb00 r8:80287e08 r7:ec1a1e60 r6:856fe600 r5:85629800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec1c9fb0 to 0xec1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85727740 INFO: task kworker/0:686:5329 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d545e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:5332 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:5332 tgid:5332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec1e5d84 r8:00000002 r7:60000013 r6:ec1e5d8c r5:8562bc00 r4:8562bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8562bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec1e5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85661f8c r4:85661c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8571eb80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:5333 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec1add84 r8:00000002 r7:60000013 r6:ec1add8c r5:847a6c00 r4:847a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:847a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec1ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85662b8c r4:85662800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85662b8c r4:8571ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:847a6c00 r8:8571ec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571ec00 r8:80287e08 r7:ec1e5e60 r6:8571ec80 r5:847a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec1adfb0 to 0xec1adff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:5335 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:5335 tgid:5335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec1f5d84 r8:00000002 r7:60000013 r6:ec1f5d8c r5:85698c00 r4:85698c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85698c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85698c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r5:8566278c r4:85662400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566278c r4:8571ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85698c00 r8:8571ed2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:5341 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:8569a400 r4:8569a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85735380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8569a400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566338c r4:85663000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566338c r4:8571ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569a400 r8:8571ee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8571ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571ee00 r8:80287e08 r7:ec1ade60 r6:8571ee80 r5:8569a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1e00 INFO: task kworker/0:690:5341 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d6443000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85698000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:85662f8c r4:85662c00 r7:dddced80 r6:83018000 r5:85662f8c r4:8571ef00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:5343 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec1b5d84 r8:00000002 r7:60000013 r6:ec1b5d8c r5:8569b000 r4:8569b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec1b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571b180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8569b000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b9f8c r4:847b9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847b9f8c r4:856fe700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569b000 r8:856fe72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fe700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fe700 r8:80287e08 r7:eb779e60 r6:85736000 r5:8569b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec1b5fb0 to 0xec1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571b440 INFO: task kworker/1:417:5343 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d6d25000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eb855d84 r8:00000002 r7:60000113 r6:eb855d8c r5:8569bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:847b938c r4:847b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8569bc00 r8:856fe7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 INFO: task kworker/1:419:5346 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5346 tgid:5346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:8569c800 r4:8569c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8573b680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8569c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b9b8c r4:847b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847b9b8c r4:856fe800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569c800 r8:856fe82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fe800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fe800 r8:80287e08 r7:eb855e60 r6:85736100 r5:8569c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571b440 INFO: task kworker/1:419:5346 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d7449000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:5349 blocked for more than 465 seconds. task:kworker/0:692 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:8569d400 r4:8569d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85735440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8569d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb259000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566378c r4:85663400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566378c r4:85736180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569d400 r8:857361ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736180 r8:80287e08 r7:eb819e60 r6:85736200 r5:8569d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d7449000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 Call trace: r5:8569e000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857358c0 r5:85663f8c r4:85663c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85663f8c r4:85736280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569e000 r8:857362ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736280 r8:80287e08 r7:eb821e60 r6:85736300 r5:8569e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85735480 INFO: task kworker/0:693:5350 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:8569ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85663b8c r4:85663800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85663b8c r4:85736380 r10:00000000 r9:85736380 r8:80287e08 r7:eb87de60 r6:85736400 r5:8569ec00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5354 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:85699800 r4:85699800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85699800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857359c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85699800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb409000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566c38c r4:8566c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566c38c r4:85736480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85699800 r8:857364ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736480 r8:80287e08 r7:eb87de60 r6:85736500 r5:85699800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85735880 INFO: task kworker/0:695:5354 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:696:5356 blocked for more than 465 seconds. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566c78c r4:8566c400 r10:61c88647 r9:856a0000 r8:857365ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566cb8c r4:8566c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566cb8c r4:85736680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a0c00 r8:857366ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736680 r8:80287e08 r7:ec209e60 r6:85736700 r5:856a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec20dfb0 to 0xec20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85735cc0 INFO: task kworker/0:697:5358 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d7b33000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:5360 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec211d84 r8:00000002 r7:60000113 r6:ec211d8c r5:856a1800 r4:856a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018005 r8:856a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 r5:8566cf8c r4:8566cc00 r7:dddced80 r6:83018000 r5:8566cf8c r4:85736780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 r4:856a2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec215e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85727bc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566d38c r4:8566d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566d38c r4:85736880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a2400 r8:857368ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736880 r8:80287e08 r7:ec211e60 r6:85736900 r5:856a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec215fb0 to 0xec215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85735e00 INFO: task kworker/0:699:5362 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d8688000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:5364 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8571be40 r5:8566d78c r4:8566d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85736980 Exception stack(0xec205fb0 to 0xec205ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/0:701:5366 blocked for more than 465 seconds. r10:8291a684 r9:ec21dd84 r8:00000002 r7:60000113 r6:ec21dd8c r5:856a4800 r4:00000000 r4:00000000 r5:00001000 r4:eb5e9000 r5:8566df8c r4:8566dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85736a80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec21dfb0 to 0xec21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8571b440 INFO: task kworker/0:701:5366 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d8db4000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8566db8c r4:8566d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856a5400 r8:85736bac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Not tainted 6.15.0-rc6-syzkaller #0 r4:856a6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec229e08 r9:83018005 r8:856a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r5:8566e38c r4:8566e000 r7:dddced80 r6:83018000 r5:8566e38c r4:85736c80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:420 state:D stack:0 pid:5372 tgid:5372 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec22de08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847b978c r4:847b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847b978c r4:856fe900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562e000 r8:856fe92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fe900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fe900 r8:80287e08 r7:eb855e60 r6:856fe980 r5:8562e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec22dfb0 to 0xec22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8573b780 INFO: task kworker/1:420:5372 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d92a9000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:5374 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:5374 tgid:5374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec235d84 r8:00000002 r7:60000113 r6:ec235d8c r5:8562c800 r4:8562c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8562c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec235e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8574d6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8562c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566e78c r4:8566e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566e78c r4:85736d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562c800 r8:85736d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736d00 r8:80287e08 r7:ec229e60 r6:856fea00 r5:8562c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec235fb0 to 0xec235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8574d540 INFO: task kworker/0:704:5374 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d94e0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:705:5376 blocked for more than 465 seconds. r4:8562ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec259e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8566ef8c r4:8566ec00 r10:61c88647 r9:8562ec00 r8:85736dac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d94e0000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:5378 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec261d84 r8:00000002 r7:60000013 r6:ec261d8c r5:85628c00 r4:85628c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85628c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec261e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8574d780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85628c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb693000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566eb8c r4:8566e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566eb8c r4:85736e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85628c00 r8:85736e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736e00 r8:80287e08 r7:ec259e60 r6:856feb00 r5:85628c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec261fb0 to 0xec261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8574d640 INFO: task kworker/0:706:5378 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: d9854000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85626c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:8566fb8c r4:8566f800 r7:dddced80 r6:83018000 r5:8566fb8c r4:85736e80 r10:00000000 r9:85736e80 r8:80287e08 r7:ec259e60 r6:856feb80 r5:85626c00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:708:5382 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:708 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec271d84 r8:00000002 r7:60000013 r6:ec271d8c r5:8562b000 r4:8562b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8562b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec271e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8574dac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8562b000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8566f38c r4:8566f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566f38c r4:85736f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562b000 r8:85736f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85736f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85736f00 r8:80287e08 r7:ec265e60 r6:856fec00 r5:8562b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec271fb0 to 0xec271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8574d980 INFO: task kworker/0:708:5382 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8574db80 r5:8566f78c r4:8566f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85736f80 r8:80287e08 r7:ec265e60 r6:856fec80 r5:85626000 r4:8574da40 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:710:5385 blocked for more than 465 seconds. r10:8291a684 r9:ec27dd84 r8:00000002 r7:60000113 r6:ec27dd8c r5:85690c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb71d000 r5:8566ff8c r4:8566fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8566ff8c r4:85752000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690c00 r8:8575202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752000 r8:80287e08 r7:ec265e60 r6:856fed00 r5:85690c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec27dfb0 to 0xec27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8574de40 INFO: task kworker/0:710:5385 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: da352000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:5387 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:5387 tgid:5387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec285d84 r8:00000002 r7:60000013 r6:ec285d8c r5:85690000 r4:85690000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec285e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85759140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85690000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567878c r4:85678400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567878c r4:85752080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690000 r8:857520ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752080 r8:80287e08 r7:ec27de60 r6:856fed80 r5:85690000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec285fb0 to 0xec285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8574dc80 INFO: task kworker/0:711:5387 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: da352000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8567838c r4:85678000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85693000 r8:8575212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8574ddc0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:00001000 r4:dfa09000 r4:85249480 r4:00000001 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:5392 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec225d84 r8:00000002 r7:60000113 r6:ec225d8c r5:856a6c00 r4:856a6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec225e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85759200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85678b8c r4:85678800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85678b8c r4:85752180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a6c00 r8:857521ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752180 r8:80287e08 r7:ec285e60 r6:85752200 r5:856a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec225fb0 to 0xec225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759400 INFO: task kworker/0:713:5392 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: da79d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 INFO: task kworker/0:714:5394 blocked for more than 465 seconds. r10:8291a684 r9:ec291d84 r8:00000002 r7:60000013 r6:ec291d8c r5:856a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec291e08 r9:83018005 r8:856a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb803000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85678f8c r4:85678c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85678f8c r4:85752280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a3000 r8:857522ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752280 r8:80287e08 r7:ec225e60 r6:85752300 r5:856a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec291fb0 to 0xec291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759240 INFO: task kworker/0:714:5394 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dac51000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:5396 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec219d84 r8:00000002 r7:60000013 r6:ec219d8c r5:84820000 r4:84820000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84820000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec219e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567938c r4:85679000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567938c r4:85752380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85752380 r8:80287e08 r7:ec291e60 r6:85752400 r5:84820000 r4:85759240 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84821800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84821800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec299e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857597c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84821800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567978c r4:85679400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567978c r4:85752480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84821800 r8:857524ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752480 r8:80287e08 r7:ec219e60 r6:85752500 r5:84821800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec299fb0 to 0xec299ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759240 INFO: task kworker/0:716:5398 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dac51000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:717:5400 blocked for more than 465 seconds. r10:8291a684 r9:ec29dd84 r8:00000002 r7:60000013 r6:ec29dd8c r5:84823000 r4:84823000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84823000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec29de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85759940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84823000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85679b8c r4:85679800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85679b8c r4:85752580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84823000 r8:857525ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752580 r8:80287e08 r7:ec299e60 r6:85752600 r5:84823000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec29dfb0 to 0xec29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759780 INFO: task kworker/0:717:5400 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dac51000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84822400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r5:85679f8c r4:85679c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84822400 r8:857526ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:5404 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:5404 tgid:5404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2a9d84 r8:00000002 r7:60000013 r6:ec2a9d8c r5:84823c00 r4:84823c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84823c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85759e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84823c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567a38c r4:8567a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567a38c r4:85752780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84823c00 r8:857527ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752780 r8:80287e08 r7:ec2a5e60 r6:85752800 r5:84823c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2a9fb0 to 0xec2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759b80 INFO: task kworker/0:719:5404 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: db2bd000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:5406 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84820c00 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eadff000 r5:8567b78c r4:8567b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567b78c r4:85752880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85752880 r8:80287e08 r7:ec2a9e60 r6:85752900 r5:84820c00 r4:85759a00 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2b1d84 r8:00000002 r7:60000113 r6:ec2b1d8c r5:85692400 r4:85692400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85692400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575d080 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85692400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec23d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567a78c r4:8567a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567a78c r4:85752980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85692400 r8:857529ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752980 r8:80287e08 r7:ec2ade60 r6:856fee80 r5:85692400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2b1fb0 to 0xec2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85759a00 INFO: task kworker/0:721:5407 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: db756000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2a1d84 r8:00000002 r7:60000113 r6:ec2a1d8c r5:85691800 r4:85691800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85691800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac1f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85691800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d4b8c r4:856d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d4b8c r4:856fef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85691800 r8:856fef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856fef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856fef00 r8:80287e08 r7:eb855e60 r6:856fef80 r5:85691800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85694800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575db40 r5:8577478c r4:85774400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85694800 r8:8576002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85695400 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:df95d000 r5:8567ab8c r4:8567a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85695400 r8:85752a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5416 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:85696000 r4:85696000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85696000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575d3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85696000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8567af8c r4:8567ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8567af8c r4:85752a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85696000 r8:85752aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752a80 r8:80287e08 r7:ec2ade60 r6:85760180 r5:85696000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8575d280 INFO: task kworker/0:723:5416 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dbf60000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85696c00 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8567bb8c r4:8567b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85696c00 r8:85752b2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:5421 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:725 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2c5d84 r8:00000002 r7:60000113 r6:ec2c5d8c r5:857b0000 r4:857b0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575da00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577438c r4:85774000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577438c r4:85752b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b0000 r8:85752bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752b80 r8:80287e08 r7:ec125e60 r6:85760280 r5:857b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2c5fb0 to 0xec2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8575d940 INFO: task kworker/0:725:5421 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dc277000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8567bf8c r4:8567bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5424 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2ddd84 r8:00000002 r7:60000113 r6:ec2ddd8c r5:857b2400 r4:857b2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb559000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577538c r4:85775000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577538c r4:85752c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b2400 r8:85752cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752c80 r8:80287e08 r7:ec2c5e60 r6:85760380 r5:857b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2ddfb0 to 0xec2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8575d840 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84826000 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85774b8c r4:85774800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84826000 r8:85752d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85752d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85752d00 r8:80287e08 r7:ec2dde60 r6:85752d80 r5:84826000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2b9fb0 to 0xec2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8575da40 INFO: task kworker/0:728:5426 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dc667000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:423:5429 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:423 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2e1d84 r8:00000002 r7:60000013 r6:ec2e1d8c r5:84824800 r4:84824800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84824800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84824800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ba38c r4:847ba000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ba38c r4:85760400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84824800 r8:8576042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85760400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85760400 r8:80287e08 r7:ec2a1e60 r6:85752e00 r5:84824800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2e1fb0 to 0xec2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85767c40 INFO: task kworker/1:423:5429 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84825400 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb4bb000 r5:85774f8c r4:85774c00 r7:dddced80 r6:83018000 r5:85774f8c r4:85752e80 r10:00000000 r9:85752e80 r8:80287e08 r7:ec2dde60 r6:85752f00 r5:84825400 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85767e00 r5:856d438c r4:856d4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857b8c00 r8:857604ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:730:5436 blocked for more than 465 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:730 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec30dd84 r8:00000002 r7:60000013 r6:ec30dd8c r5:857b9800 r4:857b9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec30de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb583000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577578c r4:85775400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577578c r4:85768000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b9800 r8:8576802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768000 r8:80287e08 r7:ec2dde60 r6:85768080 r5:857b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec30dfb0 to 0xec30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b000 INFO: task kworker/0:730:5436 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:425 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:856d478c r4:856d4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85760500 r8:80287e08 r7:ec2a1e60 r6:85760580 r5:857ba400 r4:85767d80 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:731:5439 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:731 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec2e9d84 r8:00000002 r7:60000013 r6:ec2e9d8c r5:857b3c00 r4:857b3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85775b8c r4:85775800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85775b8c r4:85768100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b3c00 r8:8576812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768100 r8:80287e08 r7:ec30de60 r6:85760600 r5:857b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2e9fb0 to 0xec2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b340 INFO: task kworker/0:731:5439 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dd8ae000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:732 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec345e08 r5:00001000 r4:eb8d1000 r5:8577638c r4:85776000 r7:dddced80 r6:83018000 r5:8577638c r4:85768180 r10:00000000 r9:85768180 r8:80287e08 r7:ec2e9e60 r6:85760680 r5:857b1800 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:733:5442 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:733 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec349d84 r8:00000002 r7:60000013 r6:ec349d8c r5:857b5400 r4:857b5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec349e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85775f8c r4:85775c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85775f8c r4:85768200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b5400 r8:8576822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768200 r8:80287e08 r7:ec345e60 r6:85760700 r5:857b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec349fb0 to 0xec349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576b400 INFO: task kworker/0:733:5442 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dde71000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:426:5446 blocked for more than 466 seconds. r4:857b6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec2f5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:856d578c r4:85760780 r10:00000000 r9:85760780 r8:80287e08 r7:ec2a1e60 r6:85760800 r5:857b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec2f5fb0 to 0xec2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ac1f40 INFO: task kworker/1:426:5446 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: de37a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec341d84 r8:00000002 r7:60000113 r6:ec341d8c r5:857b6c00 r4:857b6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec341e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580eb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d538c r4:856d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d538c r4:85760880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b6c00 r8:857608ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85760880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85760880 r8:80287e08 r7:ec2f5e60 r6:85760900 r5:857b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec341fb0 to 0xec341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85767740 INFO: task kworker/1:427:5447 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:85776b8c r4:85776800 r7:dddced80 r6:83018000 r5:85776b8c r4:85768280 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:735:5450 blocked for more than 466 seconds. r4:857b3000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:8577678c r4:85776400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577678c r4:85768300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b3000 r8:8576832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768300 r8:80287e08 r7:ec34de60 r6:85760a00 r5:857b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec351fb0 to 0xec351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576ba40 INFO: task kworker/0:735:5450 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: de86b000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:5453 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec35dd84 r8:00000002 r7:60000013 r6:ec35dd8c r5:85630000 r4:85630000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85630000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec35de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576bb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85630000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec127000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85776f8c r4:85776c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85776f8c r4:85768380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85630000 r8:857683ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768380 r8:80287e08 r7:ec34de60 r6:85760a80 r5:85630000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec35dfb0 to 0xec35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8576ba00 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:5455 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec365d84 r8:00000002 r7:60000013 r6:ec365d8c r5:85631800 r4:85631800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85631800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec365e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85631800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:85777b8c r4:85777800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85777b8c r4:85768480 r4:85768480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: deb2e000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:738:5456 blocked for more than 466 seconds. r4:85632400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec369e08 r5:8577738c r4:85777000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577738c r4:85768400 r10:61c88647 r9:85632400 r8:8576842c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:5458 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec371d84 r8:00000002 r7:60000113 r6:ec371d8c r5:85633c00 r4:85633c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85633c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec371e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576be40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85633c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec19b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577778c r4:85777400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577778c r4:85768500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85633c00 r8:8576852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768500 r8:80287e08 r7:ec365e60 r6:85760c00 r5:85633c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec371fb0 to 0xec371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfa09000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85630c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85777f8c r4:85777c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85633000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85633000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec385e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85633000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577838c r4:85778000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577838c r4:85768600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85633000 r8:8576862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768600 r8:80287e08 r7:ec381e60 r6:85760d00 r5:85633000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec385fb0 to 0xec385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857af000 INFO: task kworker/0:741:5463 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: df391000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85635400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec38de08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85778b8c r4:85778800 r7:dddced80 r6:83018000 r5:85778b8c r4:85768680 r10:00000000 r9:85768680 r8:80287e08 r7:ec385e60 r6:85760d80 r5:85635400 r4:857af180 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85634800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec391e08 r5:00001000 r4:ec1d3000 r5:8577878c r4:85778400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: df7f2000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:5469 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec39dd84 r8:00000002 r7:60000113 r6:ec39dd8c r5:85636000 r4:85636000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85636000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec39de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576b680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85636000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8577af8c r4:8577ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577af8c r4:85768780 r10:61c88647 r9:85636000 r8:857687ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8562d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85778f8c r4:85778c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85778f8c r4:85768800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8562d400 r8:8576882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768800 r8:80287e08 r7:ec39de60 r6:85760f00 r5:8562d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3a5fb0 to 0xec3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857af580 INFO: task kworker/0:745:5471 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: dffe8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:5472 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8577938c r4:85779000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 r5:85272b8c r4:85272800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:5474 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:747 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec3b1d84 r8:00000002 r7:60000113 r6:ec3b1d8c r5:85638c00 r4:85638c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85638c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85638c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577978c r4:85779400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577978c r4:85768900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85638c00 r8:8576892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768900 r8:80287e08 r7:ec39de60 r6:857fc000 r5:85638c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3b1fb0 to 0xec3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857af940 INFO: task kworker/0:747:5474 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85638000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3b9e08 r5:00001000 r4:ec31f000 r5:85779b8c r4:85779800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85768980 r8:80287e08 r7:ec39de60 r6:857fc080 r5:85638000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e0513000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:5478 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85639800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3c5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85779f8c r4:85779c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85779f8c r4:85768a00 r4:85768a00 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r4:00000000 r5:85272b8c r4:85272800 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/0:750:5480 blocked for more than 466 seconds. r4:8563bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3cde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8577a38c r4:8577a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:5482 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec3e1d84 r8:00000002 r7:60000113 r6:ec3e1d8c r5:8563b000 r4:8563b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857afd00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577a78c r4:8577a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577a78c r4:85768b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563b000 r8:85768b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768b00 r8:80287e08 r7:ec39de60 r6:857fc200 r5:8563b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3e1fb0 to 0xec3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857afe40 INFO: task kworker/0:751:5482 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e1078000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:752:5484 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:752 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec3e9d84 r8:00000002 r7:60000113 r6:ec3e9d8c r5:8563a400 r4:8563a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577ab8c r4:8577a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8563a400 r8:85768bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5488 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec405d84 r8:00000002 r7:60000113 r6:ec405d8c r5:8563d400 r4:8563d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec405e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec407000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577b38c r4:8577b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577b38c r4:85768c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563d400 r8:85768cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768c80 r8:80287e08 r7:ec401e60 r6:857fc380 r5:8563d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec405fb0 to 0xec405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd20: e14a2000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 Workqueue: events bpf_prog_free_deferred r5:8563e000 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577cb8c r4:8577c800 r7:dddced80 r6:83018000 r5:8577cb8c r4:85768d00 r10:00000000 r9:85768d00 r8:80287e08 r7:ec401e60 r6:857fc400 r5:8563e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577bb8c r4:8577b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577bb8c r4:85768d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85828000 r8:85768dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768d80 r8:80287e08 r7:ec421e60 r6:857fc480 r5:85828000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec429fb0 to 0xec429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803180 INFO: task kworker/0:756:5493 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e17ea000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:5494 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec42dd84 r8:00000002 r7:60000113 r6:ec42dd8c r5:85828c00 r4:85828c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85828c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec42de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec41d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577bf8c r4:8577bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577bf8c r4:85768e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85828c00 r8:85768e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768e00 r8:80287e08 r7:ec421e60 r6:857fc500 r5:85828c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec42dfb0 to 0xec42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803240 INFO: task kworker/0:757:5494 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8582a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec441e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577c38c r4:8577c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577c38c r4:85768e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582a400 r8:85768eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85768e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85768e80 r8:80287e08 r7:ec421e60 r6:857fc580 r5:8582a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec441fb0 to 0xec441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803380 INFO: task kworker/0:758:5496 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e1cf3000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc6-syzkaller #0 r4:85829800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec449e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85768f00 Exception stack(0xec449fb0 to 0xec449ff8) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/0:760:5500 blocked for more than 466 seconds. r4:8582b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec455e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85768f80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:5504 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec3fdd84 r8:00000002 r7:60000113 r6:ec3fdd8c r5:857bb000 r4:857bb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857bb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85803a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577d38c r4:8577d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577d38c r4:85812000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bb000 r8:8581202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812000 r8:80287e08 r7:ec455e60 r6:85812080 r5:857bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3fdfb0 to 0xec3fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803980 INFO: task kworker/0:761:5504 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e23db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5505 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec355d84 r8:00000002 r7:60000113 r6:ec355d8c r5:857bd400 r4:857bd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857bd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec355e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8576ca00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb455000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577d78c r4:8577d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577d78c r4:85812100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bd400 r8:8581212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812100 r8:80287e08 r7:ec3fde60 r6:85812180 r5:857bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec355fb0 to 0xec355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803980 INFO: task kworker/0:762:5505 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e23db000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5506 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec46dd84 r8:00000002 r7:60000113 r6:ec46dd8c r5:857bec00 r4:857bec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857bec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec46de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575d4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d678c r4:856d6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d678c r4:85812200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bec00 r8:8581222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812200 r8:80287e08 r7:ec355e60 r6:85812280 r5:857bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec46dfb0 to 0xec46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85803bc0 INFO: task kworker/0:763:5506 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580edc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d5b8c r4:856d5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d5b8c r4:857fc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bc800 r8:857fc72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fc700 r8:80287e08 r7:ec2f5e60 r6:85812300 r5:857bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec479fb0 to 0xec479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ee40 INFO: task kworker/1:428:5511 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e26ea000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec47de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857bbc00 r8:857fc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fc780 r8:80287e08 r7:ec479e60 r6:85812380 r5:857bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec47dfb0 to 0xec47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ed40 INFO: task kworker/1:429:5512 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e3118000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d638c r4:856d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d638c r4:857fc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b8000 r8:857fc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fc800 r8:80287e08 r7:ec47de60 r6:85812400 r5:857b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec481fb0 to 0xec481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580ef40 INFO: task kworker/1:430:5514 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: e3118000 eab7b000 00000001 80239b98 7f2c5000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8582d400 r8:857fc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec485d84 r8:00000002 r7:60000113 r6:ec485d8c r5:8582ec00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d738c r4:856d7000 r10:61c88647 r9:8582ec00 r8:857fc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: e34d8000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:5520 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec489d84 r8:00000002 r7:60000013 r6:ec489d8c r5:8582c800 r4:8582c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8582c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec489e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858202c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d6b8c r4:856d6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d6b8c r4:857fca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582c800 r8:857fcaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fca80 r8:80287e08 r7:ec485e60 r6:857fcb00 r5:8582c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec489fb0 to 0xec489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:764 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec48de08 r5:00001000 r4:eb5dd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577df8c r4:8577dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577df8c r4:85812480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582e000 r8:858124ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812480 r8:80287e08 r7:ec46de60 r6:857fcb80 r5:8582e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec48dfb0 to 0xec48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8580e140 INFO: task kworker/0:764:5521 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e38ce000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:5524 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec499d84 r8:00000002 r7:60000113 r6:ec499d8c r5:8582bc00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb5b5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577eb8c r4:8577e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8582bc00 r8:8581252c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeab2dd28 to 0xeab2dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:766:5526 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec495d84 r8:00000002 r7:60000013 r6:ec495d8c r5:8563ec00 r4:8563ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec495e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb577000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577e78c r4:8577e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577e78c r4:85812580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563ec00 r8:858125ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812580 r8:80287e08 r7:ec499e60 r6:857fcc80 r5:8563ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec495fb0 to 0xec495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8581e080 INFO: task kworker/0:766:5526 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e3c5f000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:5528 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85830c00 r4:8291a680 r4:00000000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb681000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d6f8c r4:856d6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d6f8c r4:857fcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85830c00 r8:857fcd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fcd00 r8:80287e08 r7:ec485e60 r6:857fcd80 r5:85830c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a1fb0 to 0xec4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820340 INFO: task kworker/1:434:5528 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85243840 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d7b8c r4:856d7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r4:eab2ddc0 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeab2dfb0 to 0xeab2dff8) r4:85243840 task:kworker/1:436 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec469d84 r8:00000002 r7:60000013 r6:ec469d8c r5:85832400 r4:85832400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85832400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec469e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85832400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d778c r4:856d7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d778c r4:857fcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85832400 r8:857fcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857fcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857fcf00 r8:80287e08 r7:ec49de60 r6:857fcf80 r5:85832400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec469fb0 to 0xec469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820700 INFO: task kworker/1:436:5532 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e3f08000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:5534 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:5534 tgid:5534 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85833000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec491e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:5537 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4a5d84 r8:00000002 r7:60000013 r6:ec4a5d8c r5:85833c00 r4:85833c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85833c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85820b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb741000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847ba78c r4:847ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847ba78c r4:85825100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85833c00 r8:8582512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825100 r8:80287e08 r7:ec491e60 r6:85825180 r5:85833c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a5fb0 to 0xec4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820a80 INFO: task kworker/1:438:5537 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e4507000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:5538 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4a9d84 r8:00000002 r7:60000113 r6:ec4a9d8c r5:85834800 r5:85834800 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:eb7f3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:800f0013 r4:80239bb0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:85243840 task:kworker/1:440 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589878c r4:85898400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589878c r4:85825300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857c1800 r8:8582532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825300 r8:80287e08 r7:ec4a9e60 r6:85812600 r5:857c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b5fb0 to 0xec4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85820d80 INFO: task kworker/1:440:5540 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e46ac000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:5542 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4bdd84 r8:00000002 r7:60000113 r6:ec4bdd8c r5:857c2400 r4:857c2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857c2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:eb823000 r4:85825380 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r5:800f0013 r4:80239bb0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:5544 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4c1d84 r8:00000002 r7:60000113 r6:ec4c1d8c r5:857c0c00 r4:857c0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857c0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858157c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec25b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589a78c r4:8589a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589a78c r4:85825400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857c0c00 r8:8582542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825400 r8:80287e08 r7:ec4bde60 r6:85812700 r5:857c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4c1fb0 to 0xec4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:858204c0 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:857c3000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85825480 r8:80287e08 r7:ec4c1e60 r6:85812780 r5:857c3000 r4:858204c0 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:5547 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4cdd84 r8:00000002 r7:60000013 r6:ec4cdd8c r5:857c4800 r4:857c4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857c4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb889000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589938c r4:85899000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589938c r4:85825500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857c4800 r8:8582552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825500 r8:80287e08 r7:ec4c1e60 r6:85812800 r5:857c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4cdfb0 to 0xec4cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815200 INFO: task kworker/1:444:5547 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e4f1a000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8b1000 r4:85825580 5fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5551 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4ddd84 r8:00000002 r7:60000013 r6:ec4ddd8c r5:857c5400 r4:857c5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857c5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85899b8c r4:85899800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85899b8c r4:85825600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857c5400 r8:8582562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825600 r8:80287e08 r7:ec4c1e60 r6:85812900 r5:857c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4ddfb0 to 0xec4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:858155c0 INFO: task kworker/1:446:5551 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e5196000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:85825680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:448:5555 blocked for more than 466 seconds. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4ede08 r9:83018205 r8:857c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85825780 r8:80287e08 r7:ec4c1e60 r6:85812a00 r5:857c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4edfb0 to 0xec4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815300 INFO: task kworker/1:448:5555 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e5855000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:5559 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4b9d84 r8:00000002 r7:60000113 r6:ec4b9d8c r5:85836000 r4:85836000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85836000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85836000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec26d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589ab8c r4:8589a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589ab8c r4:85825700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85836000 r8:8582572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825700 r8:80287e08 r7:ec4c1e60 r6:85825800 r5:85836000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b9fb0 to 0xec4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815780 INFO: task kworker/1:449:5559 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:450:5560 blocked for more than 466 seconds. r4:85836c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec27f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589af8c r4:8589ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589af8c r4:85825880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85836c00 r8:858258ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825880 r8:80287e08 r7:ec4b9e60 r6:85825900 r5:85836c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f5fb0 to 0xec4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815940 INFO: task kworker/1:450:5560 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e5c36000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:5562 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:5562 tgid:5562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4f9d84 r8:00000002 r7:60000113 r6:ec4f9d8c r5:85835400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r9:83018205 r8:85835400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r4:85825980 9fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:5564 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec501d84 r8:00000002 r7:60000113 r6:ec501d8c r5:85830000 r4:85830000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85830000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec501e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f5040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85830000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec505000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589bb8c r4:8589b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589bb8c r4:85825a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85830000 r8:85825aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825a80 r8:80287e08 r7:ec4f9e60 r6:85825b00 r5:85830000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec501fb0 to 0xec501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815c00 INFO: task kworker/1:452:5564 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:85636c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815dc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85636c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589b78c r4:8589b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589b78c r4:85825b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85636c00 r8:85825bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825b80 r8:80287e08 r7:ec501e60 r6:85825c00 r5:85636c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b1fb0 to 0xec4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85815c00 INFO: task kworker/1:453:5566 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e66c8000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:5569 blocked for more than 466 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85888000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85825c80 r8:80287e08 r7:ec501e60 r6:85825d00 r5:85888000 r4:857f5280 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:5570 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:85888c00 r4:85888c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85888c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f5300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec519000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a438c r4:858a4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a438c r4:85825d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85888c00 r8:85825dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825d80 r8:80287e08 r7:ec509e60 r6:85825e00 r5:85888c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec511fb0 to 0xec511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f5100 INFO: task kworker/1:455:5570 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:456:5572 blocked for more than 467 seconds. r4:85889800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85825e80 r8:80287e08 r7:ec511e60 r6:85825f00 r5:85889800 r4:857f52c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:457:5575 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:5575 tgid:5575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec525d84 r8:00000002 r7:60000113 r6:ec525d8c r5:8588a400 r4:8588a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec525e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f5480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8588a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a478c r4:858a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a478c r4:85825f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588a400 r8:85825fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85825f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85825f80 r8:80287e08 r7:ec51de60 r6:857ee000 r5:8588a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec525fb0 to 0xec525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f53c0 INFO: task kworker/1:457:5575 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e6e5d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:458:5576 blocked for more than 467 seconds. r4:8588b000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8588b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 r4:857ee080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:459:5578 blocked for more than 467 seconds. r4:8588bc00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec53b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a4f8c r4:858a4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a4f8c r4:857ee180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588bc00 r8:857ee1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ee180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ee180 r8:80287e08 r7:ec531e60 r6:857ee200 r5:8588bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f5900 INFO: task kworker/1:459:5578 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e6e5d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:5580 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec545d84 r8:00000002 r7:60000013 r6:ec545d8c r5:8588c800 r4:8588c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857f5940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8588c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a538c r4:858a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a538c r4:857ee280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588c800 r8:857ee2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ee280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ee280 r8:80287e08 r7:ec531e60 r6:857ee300 r5:8588c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec54dd84 r8:00000002 r7:60000013 r6:ec54dd8c r5:8588d400 r4:00000000 r4:00000000 r5:858a5b8c r4:858a5800 r10:00000000 r9:857ee380 r8:80287e08 r7:ec531e60 r6:857ee400 r5:8588d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e727d000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:5584 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec559d84 r8:00000002 r7:60000113 r6:ec559d8c r5:8588e000 r4:8588e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8588e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8588e000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a678c r4:858a6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a678c r4:857ee480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588e000 r8:857ee4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ee480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:463:5586 blocked for more than 467 seconds. r10:8291a684 r9:ec561d84 r8:00000002 r7:60000113 r6:ec561d8c r5:8588ec00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:858a5f8c r4:857ee580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8588ec00 r8:857ee5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ee580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ee580 r8:80287e08 r7:ec559e60 r6:857ee600 r5:8588ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec561fb0 to 0xec561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857f5c80 INFO: task kworker/1:463:5586 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e7d18000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5588 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec359d84 r8:00000002 r7:60000113 r6:ec359d8c r5:85890000 r4:85890000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85890000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec359e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85815f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85890000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r4:85249480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:858a6b8c r4:858a6800 r10:00000000 r9:857ee780 r8:80287e08 r7:ec559e60 r6:857ee800 r5:85890c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e7d18000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5593 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec379d84 r8:00000002 r7:60000013 r6:ec379d8c r5:85891800 r4:85891800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85891800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec379e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85891800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a6f8c r4:858a6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a6f8c r4:857ee880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249480 Exception stack(0xeab2dfb0 to 0xeab2dff8) INFO: task kworker/1:467:5595 blocked for more than 467 seconds. r4:85892400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3bde08 r9:83018205 r8:85892400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r4:857ee980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:5596 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:5596 tgid:5596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec375d84 r8:00000002 r7:60000013 r6:ec375d8c r5:85893000 r4:85893000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85893000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec375e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8575e480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85893000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a738c r4:858a7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a738c r4:857eea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85893000 r8:857eeaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857eea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857eea80 r8:80287e08 r7:ec3bde60 r6:857eeb00 r5:85893000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec375fb0 to 0xec375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeab2dd28 to 0xeab2dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:5600 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:5600 tgid:5600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec3f5d84 r8:00000002 r7:60000013 r6:ec3f5d8c r5:85894800 r4:85894800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85894800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85894800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec10f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0f8c r4:858b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b0f8c r4:857eed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85894800 r8:857eed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857eed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857eed00 r8:80287e08 r7:ec3c1e60 r6:857eed80 r5:85894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec3f5fb0 to 0xec3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8575e900 INFO: task kworker/1:470:5600 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e8a88000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:471:5602 blocked for more than 467 seconds. r5:85896c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85895400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8581ec40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85895400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b038c r4:858b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b038c r4:857eee80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85895400 r8:857eeeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857eee80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857eee80 r8:80287e08 r7:ec3f5e60 r6:857eef00 r5:85895400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec431fb0 to 0xec431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8575e7c0 INFO: task kworker/1:472:5603 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e9157000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:5606 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec575d84 r8:00000002 r7:60000113 r6:ec575d8c r5:85839800 r4:85839800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85839800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec575e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85839800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577fb8c r4:8577f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577fb8c r4:85812a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85839800 r8:85812aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85812a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85812a80 r8:80287e08 r7:ec499e60 r6:857eef80 r5:85839800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ae940 INFO: task kworker/0:767:5606 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 Exception stack(0xeab2dd28 to 0xeab2dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85838000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8575a000 r8:80287e08 r7:ec3f5e60 r6:8575a080 r5:85838000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243840 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8583a400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec3d9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85812b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857ae940 INFO: task kworker/0:768:5611 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e9708000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:5612 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec579d84 r8:00000002 r7:60000013 r6:ec579d8c r5:8583b000 r4:8583b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857541c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8583b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b0b8c r4:858b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b0b8c r4:8575a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583b000 r8:8575a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8575a200 r8:80287e08 r7:ec3f5e60 r6:8575a280 r5:8583b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r5:00001000 r4:dfa09000 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8583bc00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754780 r7:ddde2d80 r6:83018200 r5:858b178c r4:8575a100 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e9d81000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:5617 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec57dd84 r8:00000002 r7:60000013 r6:ec57dd8c r5:8583d400 r4:8583d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8583d400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec119000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b138c r4:858b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b138c r4:8575a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583d400 r8:8575a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a380 r8:80287e08 r7:ec56de60 r6:8575a400 r5:8583d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec57dfb0 to 0xec57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857544c0 INFO: task kworker/1:476:5617 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: e9d81000 eab7b000 00000001 80239b98 7f2c5000 00000001 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 INFO: task kworker/1:477:5619 blocked for more than 467 seconds. r10:8291a684 r9:ec581d84 r8:00000002 r7:60000013 r6:ec581d8c r5:8583e000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8583e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b1b8c r4:858b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b1b8c r4:8575a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8583e000 r8:8575a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a480 r8:80287e08 r7:ec56de60 r6:8575a500 r5:8583e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec581fb0 to 0xec581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85754740 INFO: task kworker/1:477:5619 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ea348000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243840 task:kworker/1:478 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243840 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:5623 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec589d84 r8:00000002 r7:60000113 r6:ec589d8c r5:8583c800 r4:8583c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8583c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8575a680 r8:80287e08 r7:ec585e60 r6:8575a700 r5:8583c800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec589fb0 to 0xec589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85754800 INFO: task kworker/1:479:5623 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ea84c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eab2ddc0 r5:eab2de08 r4:eab2ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272b8c r4:85272800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249480 r8:80287e08 r7:eab89e60 r6:85249500 r5:84a90000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85838c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85754bc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b238c r4:858b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b238c r4:8575a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85838c00 r8:8575a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a780 r8:80287e08 r7:ec589e60 r6:8575a800 r5:85838c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85754e00 INFO: task kworker/1:480:5625 is blocked on a mutex likely owned by task kworker/0:296:4183. task:kworker/0:296 state:R running task stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a90000 r8:80200be4 r7:eab2dd5c r6:ffffffff r5:84a90000 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeab2dd28 to 0xeab2dd70) dd20: ea84c000 eab7b000 00000001 80239b98 7f2c5000 00000001 dd40: 82ac15a0 7f2c5000 eab7b000 8280c928 82ac21c4 eab2dda4 eab2dda8 eab2dd78 dd60: 80230ad0 80239bb0 800f0013 ffffffff r5:800f0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:85272b8c r4:85272800 r7:dddced80 r6:83018000 r5:85272b8c r4:85249480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a90000 r8:852494ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:858b278c r4:858b2400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:482 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r5:00001000 r4:ec2d5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84791800 r8:8575a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:900b0013 r4:80239bb0 r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:5632 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5add84 r8:00000002 r7:60000013 r6:ec5add8c r5:84790c00 r4:84790c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84790c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84790c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b338c r4:858b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b338c r4:8575a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84790c00 r8:8575a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575a980 r8:80287e08 r7:ec5a5e60 r6:85812c80 r5:84790c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:484:5634 blocked for more than 467 seconds. r5:84793c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b378c r4:8575aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84793c00 r8:8575aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575aa00 r8:80287e08 r7:ec5ade60 r6:85812d00 r5:84793c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743240 INFO: task kworker/1:484:5634 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 7f8c2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 900b0013 ffffffff r5:900b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:5635 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b5d84 r8:00000002 r7:60000013 r6:ec5b5d8c r5:84795400 r4:84795400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84795400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b878c r4:858b8400 r10:61c88647 r9:84795400 r8:8575aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8575aa80 r8:80287e08 r7:ec5b1e60 r6:85812d80 r5:84795400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b5fb0 to 0xec5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743240 INFO: task kworker/1:485:5635 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 900b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:486 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743380 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3b8c r4:858b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8575ab00 Exception stack(0xec5b9fb0 to 0xec5b9ff8) INFO: task kworker/1:486:5636 is blocked on a mutex likely owned by task kworker/0:297:4186. dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84794800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84794800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84794800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec37b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b3f8c r4:858b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b3f8c r4:8575ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84794800 r8:8575abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575ab80 r8:80287e08 r7:ec5b5e60 r6:85812e80 r5:84794800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743340 INFO: task kworker/1:487:5638 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 7fd18000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 900b0013 ffffffff r5:900b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c9d84 r8:00000002 r7:60000013 r6:ec5c9d8c r5:84790000 r4:84790000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84790000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84790000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec389000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b838c r4:858b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b838c r4:8575ac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84790000 r8:8575ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575ac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575ac00 r8:80287e08 r7:ec5b5e60 r6:85812f00 r5:84790000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c9fb0 to 0xec5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: 7fd18000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r9:83018205 r8:84796c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84796c00 r8:8575acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 900b0013 ffffffff r4:eaa3ddc0 r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:5645 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d1d84 r8:00000002 r7:60000013 r6:ec5d1d8c r5:84792400 r4:84792400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84792400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b8f8c r4:858b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b8f8c r4:8575ad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84792400 r8:8575ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575ad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575ad00 r8:80287e08 r7:ec5cde60 r6:8572f000 r5:84792400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800b0013 r4:80239bb0 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae99000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec445fb0 to 0xec445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743980 INFO: task kworker/1:491:5647 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 800d3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:5649 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec451d84 r8:00000002 r7:60000113 r6:ec451d8c r5:857c6000 r4:857c6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857c6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743b80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b938c r4:858b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8575ae00 r8:80287e08 r7:ec445e60 r6:8572f100 r5:857c6000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743ac0 INFO: task kworker/1:492:5649 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 806fb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:5651 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec45dd84 r8:00000002 r7:60000013 r6:ec45dd8c r5:84b60000 r4:84b60000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b60000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec45de08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b9f8c r4:858b9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b60000 r8:8575aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:494 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec44dd84 r8:00000002 r7:60000113 r6:ec44dd8c r5:858d9800 r4:858d9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858d9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec44de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858b9b8c r4:858b9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b9b8c r4:8575af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d9800 r8:8575af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8575af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8575af00 r8:80287e08 r7:ec45de60 r6:8575af80 r5:858d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec44dfb0 to 0xec44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85743f40 INFO: task kworker/1:494:5652 is blocked on a mutex likely owned by task kworker/0:297:4186. Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:495:5654 blocked for more than 467 seconds. r5:858da400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85743f80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858da400 r8:8572d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:5656 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:5656 tgid:5656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec471d84 r8:00000002 r7:60000013 r6:ec471d8c r5:858db000 r4:858db000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858db000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec471e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85723000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858db000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bab8c r4:858ba800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bab8c r4:8572d100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858db000 r8:8572d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572d100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572d100 r8:80287e08 r7:ec5c5e60 r6:8572d180 r5:858db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec471fb0 to 0xec471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857430c0 INFO: task kworker/1:496:5656 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ba78c r4:858ba400 r10:61c88647 r9:858dbc00 r8:8572d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec55dfb0 to 0xec55dff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:858dc800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec569e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857233c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858baf8c r4:858bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858baf8c r4:8572d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dc800 r8:8572d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572d300 r8:80287e08 r7:ec471e60 r6:8572d380 r5:858dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec569fb0 to 0xec569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857230c0 INFO: task kworker/1:498:5661 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 814d1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:5662 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:858dd400 r4:858dd400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858dd400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85723500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:858dd400 r8:8572d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 814d1000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:eaa3ddc0 r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:5665 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d9d84 r8:00000002 r7:60000013 r6:ec5d9d8c r5:858dec00 r4:858dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85723440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bb38c r4:858bb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bb38c r4:8572d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858dec00 r8:8572d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572d500 r8:80287e08 r7:ec599e60 r6:8572d580 r5:858dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d9fb0 to 0xec5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85723580 INFO: task kworker/1:500:5665 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:5668 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:5668 tgid:5668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d5d84 r8:00000002 r7:60000013 r6:ec5d5d8c r5:858de000 r4:858de000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858de000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85723700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858de000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb713000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bbb8c r4:858bb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bbb8c r4:8572d600 r10:61c88647 r9:858de000 r8:8572d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 817fd000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:858d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:eb7fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c038c r4:858c0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c038c r4:8572d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d8c00 r8:8572d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572d700 r8:80287e08 r7:ec5d5e60 r6:8572d780 r5:858d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e1fb0 to 0xec5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85723740 INFO: task kworker/1:502:5670 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 817fd000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 task:kworker/1:503 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bbf8c r4:858bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bbf8c r4:8572d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858d8000 r8:8572d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572d800 r8:80287e08 r7:ec5e1e60 r6:8572d880 r5:858d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85723740 INFO: task kworker/1:503:5671 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 81d52000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858c138c r4:858c1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 task:kworker/1:505 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5dde08 r9:83018205 r8:85896000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c078c r4:858c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c078c r4:8572da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85896000 r8:8572da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572da00 r8:80287e08 r7:ec5e9e60 r6:8572da80 r5:85896000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5ddfb0 to 0xec5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85723d40 INFO: task kworker/1:505:5675 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 82051000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85840000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ede08 r9:83018205 r8:85840000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:858c0b8c r4:858c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c0b8c r4:8572db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85840000 r8:8572db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572db00 r8:80287e08 r7:ec5e9e60 r6:8572db80 r5:85840000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85723cc0 INFO: task kworker/1:506:5678 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 82051000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5680 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5680 tgid:5680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f9d84 r8:00000002 r7:60000113 r6:ec5f9d8c r5:85841800 r4:85841800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858d578c r4:858d5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858d578c r4:8572f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85841800 r8:8572f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8572f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572f200 r8:80287e08 r7:ec575e60 r6:8572dc00 r5:85841800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f9fb0 to 0xec5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572bf00 INFO: task kworker/0:769:5680 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 826eb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000013 r6:ec5f1d8c r5:85842400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570a040 r5:858c0f8c r4:858c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c0f8c r4:8572dc80 r10:61c88647 r9:85842400 r8:8572dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 826eb000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570a4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85843000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec277000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c1b8c r4:858c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c1b8c r4:8572dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85843000 r8:8572ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8572dd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572dd80 r8:80287e08 r7:ec5e9e60 r6:8572de00 r5:85843000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f5fb0 to 0xec5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570a100 INFO: task kworker/1:508:5684 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 82c64000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:5686 blocked for more than 467 seconds. r10:8291a684 r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:85843c00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c178c r4:858c1400 r7:ddde2d80 r6:83018200 r5:858c178c r4:8572de80 r10:00000000 r9:8572de80 r8:80287e08 r7:ec5f5e60 r6:8572df00 r5:85843c00 INFO: task kworker/1:509:5686 is blocked on a mutex likely owned by task kworker/0:297:4186. Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec605d84 r8:00000002 r7:60000013 r6:ec605d8c r5:85844800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 r5:858c278c r4:858c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85844800 r8:8572dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 82c64000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:5690 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:5690 tgid:5690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:85846000 r4:85846000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85846000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570a700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85846000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec287000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c1f8c r4:858c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c1f8c r4:8570c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85846000 r8:8570c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570c080 r8:80287e08 r7:ec605e60 r6:8570c100 r5:85846000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570a680 INFO: task kworker/1:511:5690 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 82c64000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:85846c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec3d3000 r5:858c238c r4:858c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8570c180 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 r5:00001000 r4:dfc17000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:85845400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858c2b8c r4:858c2800 r10:61c88647 r9:85845400 r8:8570c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570c280 r8:80287e08 r7:ec605e60 r6:8570c300 r5:85845400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570aac0 INFO: task kworker/1:513:5695 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8365d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec615d84 r8:00000002 r7:60000013 r6:ec615d8c r5:85840c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858c2f8c r4:858c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c2f8c r4:8570c380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8570c380 r8:80287e08 r7:ec601e60 r6:8570c400 r5:85840c00 INFO: task kworker/1:514:5696 is blocked on a mutex likely owned by task kworker/0:297:4186. dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:515:5699 blocked for more than 467 seconds. r5:85848000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570aec0 r5:858c338c r4:858c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85848000 r8:8570c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:5701 blocked for more than 467 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:5701 tgid:5701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec61dd84 r8:00000002 r7:60000013 r6:ec61dd8c r5:85848c00 r4:85848c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85848c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85723e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec423000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c378c r4:858c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c378c r4:8570c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85848c00 r8:8570c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570c580 r8:80287e08 r7:ec619e60 r6:8570c600 r5:85848c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8570ae00 INFO: task kworker/1:516:5701 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 83c36000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:5702 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:5702 tgid:5702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec611d84 r8:00000002 r7:60000113 r6:ec611d8c r5:85849800 r4:85849800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85849800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f81c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85849800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec459000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c3f8c r4:858c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c3f8c r4:8570c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85849800 r8:8570c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570c680 r8:80287e08 r7:ec61de60 r6:8570c700 r5:85849800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f8080 INFO: task kworker/1:517:5702 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:eaa3ddc0 r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:5704 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec435000 r5:858c3b8c r4:858c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c3b8c r4:8570c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:8584b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 r5:858cc38c r4:858cc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f8180 INFO: task kworker/1:519:5706 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 84070000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:5708 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:8584bc00 r4:8584bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f84c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cc78c r4:858cc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cc78c r4:8570c980 r4:8570c980 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 844a7000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f87c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8584d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ccb8c r4:858cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ccb8c r4:8570ca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584d400 r8:8570ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570ca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570ca00 r8:80287e08 r7:ec629e60 r6:8570cb00 r5:8584d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f8500 INFO: task kworker/1:521:5710 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 844a7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cd38c r4:858cd000 r10:61c88647 r9:8584e000 r8:8570cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 84726000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 r5:8584ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858ccf8c r4:858ccc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ccf8c r4:8570cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584ec00 r8:8570ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570cc80 r8:80287e08 r7:ec62de60 r6:8570cd00 r5:8584ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f8b80 INFO: task kworker/1:523:5714 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 84cf7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:8584c800 r4:8291a680 r4:00000000 r9:83018205 r8:8584c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r5:858cd78c r4:858cd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8584c800 r8:8570cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f8d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85850000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec503000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cdb8c r4:858cd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cdb8c r4:8570ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85850000 r8:8570ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570ce80 r8:80287e08 r7:ec639e60 r6:8570cf00 r5:85850000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f8bc0 INFO: task kworker/1:525:5718 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 85170000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85850c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec521000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ce38c r4:858ce000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ce38c r4:8570cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85850c00 r8:8570cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8570cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570cf80 r8:80287e08 r7:ec63de60 r6:855fd000 r5:85850c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:527 state:D stack:0 pid:5721 tgid:5721 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cdf8c r4:858cdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855fd080 r8:80287e08 r7:ec641e60 r6:855fd100 r5:85851800 INFO: task kworker/1:527:5721 is blocked on a mutex likely owned by task kworker/0:297:4186. Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:5724 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:85852400 r4:85852400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85852400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85852400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0685000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cef8c r4:858cec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cef8c r4:855fd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85852400 r8:855fd1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd180 r8:80287e08 r7:ec641e60 r6:855fd200 r5:85852400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ff280 INFO: task kworker/1:528:5724 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 85841000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:5725 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:85853000 r4:85853000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85853000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85853000 r7:00000000 r6:83018200 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ceb8c r4:858ce800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ceb8c r4:855fd280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85853000 r8:855fd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd280 r8:80287e08 r7:ec645e60 r6:855fd300 r5:85853000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ff200 INFO: task kworker/1:529:5725 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 85e15000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:5729 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:858cf38c r4:858cf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cf38c r4:855fd380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:531:5731 blocked for more than 468 seconds. r5:85854800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8611a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:5733 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:84b63c00 r4:84b63c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b63c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ff940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cfb8c r4:858cf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cfb8c r4:855fd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b63c00 r8:855fd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd600 r8:80287e08 r7:ec591e60 r6:8572f280 r5:84b63c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ff880 INFO: task kworker/1:532:5733 is blocked on a mutex likely owned by task kworker/0:297:4186. Workqueue: events bpf_prog_free_deferred dd20: 861e9000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84b61800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:858d478c r4:858d4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b61800 r8:855fd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd580 r8:80287e08 r7:ec659e60 r6:8572f300 r5:84b61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec661fb0 to 0xec661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ff640 INFO: task kworker/1:533:5735 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 861e9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:5737 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:84b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:858cff8c r4:858cfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cff8c r4:855fd680 r10:61c88647 r9:84b66c00 r8:855fd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:534:5737 is blocked on a mutex likely owned by task kworker/0:297:4186. Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 864ae000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:5738 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec66dd84 r8:00000002 r7:60000013 r6:ec66dd8c r5:84b64800 r4:84b64800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:858d438c r4:858d4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d438c r4:855fd700 r10:61c88647 r9:84b64800 r8:855fd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 867be000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d4b8c r4:858d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4b8c r4:855fd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b66000 r8:855fd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd780 r8:80287e08 r7:ec661e60 r6:8572f480 r5:84b66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ffc40 INFO: task kworker/1:536:5741 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r5:00001000 r4:eb8fd000 r5:858d4f8c r4:858d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fd800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec681fb0 to 0xec681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ffe40 INFO: task kworker/1:537:5743 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 86e50000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:84b62400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85320040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b62400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec193000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d538c r4:858d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d538c r4:855fd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b62400 r8:855fd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd880 r8:80287e08 r7:ec681e60 r6:8572f580 r5:84b62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855ffe40 INFO: task kworker/1:538:5745 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:5746 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:5746 tgid:5746 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:857d8000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r5:00001000 r4:ec117000 r5:8577f78c r4:8577f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8577f78c r4:855fd900 r10:61c88647 r9:857d8000 r8:855fd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d5b8c r4:858d5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d5b8c r4:855fd980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d8c00 r8:855fd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fd980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd980 r8:80287e08 r7:ec689e60 r6:8572f680 r5:857d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85320100 INFO: task kworker/1:540:5749 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 873ae000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:857d9800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ec6f1000 r5:84ace38c r4:84ace000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84ace38c r4:8572f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857da400 r8:8572f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8572f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572f780 r8:80287e08 r7:ec575e60 r6:8572f800 r5:857da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec685fb0 to 0xec685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb380 INFO: task kworker/0:770:5753 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 87593000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:857db000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:858d678c r4:858d6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857db000 r8:855fdaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 87593000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:543 state:D stack:0 pid:5757 tgid:5757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec699d84 r8:00000002 r7:60000013 r6:ec699d8c r5:857dbc00 r4:857dbc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dbc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85320500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec311000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d638c r4:858d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d638c r4:855fdb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dbc00 r8:855fdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fdb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdb00 r8:80287e08 r7:ec59de60 r6:8572f900 r5:857dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec699fb0 to 0xec699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853206c0 INFO: task kworker/1:543:5757 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 87890000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) task:kworker/1:544 state:D stack:0 pid:5760 tgid:5760 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853207c0 r5:858d6b8c r4:858d6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855fdb80 r8:80287e08 r7:ec59de60 r6:8572f980 r5:857dc800 INFO: task kworker/1:544:5760 is blocked on a mutex likely owned by task kworker/0:297:4186. dd20: 87aa5000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r5:857dd400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:858d6f8c r4:855fdc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85320740 INFO: task kworker/1:545:5762 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 87e7d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:546:5764 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:546 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b5d84 r8:00000002 r7:60000113 r6:ec6b5d8c r5:84b60c00 r4:84b60c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b60c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d778c r4:858d7400 r10:61c88647 r9:84b60c00 r8:855fdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:84b65400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d738c r4:858d7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d738c r4:855fdd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b65400 r8:855fdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fdd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdd00 r8:80287e08 r7:ec6b5e60 r6:8572fb00 r5:84b65400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853208c0 INFO: task kworker/1:547:5765 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 88144000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:548:5768 blocked for more than 468 seconds. r5:857de000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d7f8c r4:858d7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 8830a000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:5769 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c5d84 r8:00000002 r7:60000013 r6:ec6c5d8c r5:84b78000 r4:84b78000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b78000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85320cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b78000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec565000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858d7b8c r4:858d7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d7b8c r4:855fde00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b78000 r8:855fde2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fde00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fde00 r8:80287e08 r7:ec6c1e60 r6:8572fc00 r5:84b78000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c5fb0 to 0xec6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85320b40 INFO: task kworker/1:549:5769 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8853a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:5771 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b1d84 r8:00000002 r7:60000113 r6:ec6b1d8c r5:85856c00 r4:85856c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85856c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85856c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aceb8c r4:84ace800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aceb8c r4:855fde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85856c00 r8:855fdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fde80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fde80 r8:80287e08 r7:ec6c1e60 r6:855fdf00 r5:85856c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b1fb0 to 0xec6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85320d00 INFO: task kworker/1:550:5771 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6cdd84 r8:00000002 r7:60000113 r6:ec6cdd8c r5:85856000 r4:85856000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85856000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbfc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85856000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8577ff8c r4:8577fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8577ff8c r4:8572fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85856000 r8:8572fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8572fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572fc80 r8:80287e08 r7:ec685e60 r6:855fdf80 r5:85856000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6cdfb0 to 0xec6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fbc00 INFO: task kworker/0:771:5773 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8891d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853f8000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 88e9a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:772 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ace78c r4:84ace400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8572fd00 Exception stack(0xec6e1fb0 to 0xec6e1ff8) INFO: task kworker/0:772:5777 is blocked on a mutex likely owned by task kworker/0:297:4186. dd20: 88e9a000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/1:552:5778 blocked for more than 468 seconds. r5:84b68000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540d000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b68000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e838c r4:858e8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e838c r4:853f8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68000 r8:853f81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8180 r8:80287e08 r7:ec6dde60 r6:853f8200 r5:84b68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540d140 INFO: task kworker/1:552:5778 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 88e9a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:553:5780 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:553 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f9d84 r8:00000002 r7:60000013 r6:ec6f9d8c r5:84b6bc00 r4:84b6bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b6bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540dc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec725000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e8f8c r4:858e8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e8f8c r4:853f8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6bc00 r8:853f82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8280 r8:80287e08 r7:ec6dde60 r6:853f8300 r5:84b6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f9fb0 to 0xec6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540d2c0 INFO: task kworker/1:553:5780 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 89181000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84b6c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8572fd80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fcc00 INFO: task kworker/0:773:5783 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 89181000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5784 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84b6d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85799b8c r4:85799800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b6d400 r8:8572fe2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:84b6b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540d940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b6b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec71f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e8b8c r4:858e8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858e8b8c r4:8572fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b6b000 r8:8572feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8572fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8572fe80 r8:80287e08 r7:ec715e60 r6:853f8480 r5:84b6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fcac0 INFO: task kworker/0:775:5786 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 894fa000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8572ff00 Exception stack(0xec72dfb0 to 0xec72dff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:554:5791 blocked for more than 468 seconds. r5:84b6e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:853f8580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 89935000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:5793 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c9d84 r8:00000002 r7:60000013 r6:ec6c9d8c r5:84b68c00 r4:84b68c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b68c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540dcc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e938c r4:858e9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e938c r4:853f8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b68c00 r8:853f86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8680 r8:80287e08 r7:ec729e60 r6:853f8700 r5:84b68c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c9fb0 to 0xec6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540dd00 INFO: task kworker/1:555:5793 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 89935000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 r4:00000000 r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:5795 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:5795 tgid:5795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e9d84 r8:00000002 r7:60000113 r6:ec6e9d8c r5:85855400 r4:85855400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85855400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e978c r4:858e9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e978c r4:853f8780 r10:61c88647 r9:85855400 r8:853f87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 89f6b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:5797 blocked for more than 468 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbb80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec749000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858e9f8c r4:858e9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858e9f8c r4:853f8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7a400 r8:853f88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8880 r8:80287e08 r7:ec729e60 r6:8572ff80 r5:84b7a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540da40 INFO: task kworker/1:557:5797 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 89f6b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec761d84 r8:00000002 r7:60000113 r6:ec761d8c r5:84b7bc00 r4:84b7bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b7bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec761e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540d140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec757000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ea38c r4:858ea000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ea38c r4:853f8900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7bc00 r8:853f892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8900 r8:80287e08 r7:ec74de60 r6:853ee000 r5:84b7bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec761fb0 to 0xec761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889940 INFO: task kworker/1:558:5799 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8a3de000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:84b7b000 r4:8291a680 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec75d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ea78c r4:858ea400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ea78c r4:853f8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7b000 r8:853f89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8980 r8:80287e08 r7:ec761e60 r6:853ee080 r5:84b7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd0c0 INFO: task kworker/1:559:5801 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8aa6a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eab8c r4:858ea800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b7c800 r8:853f8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:eaa3ddc0 r5:00001000 r4:dfc17000 r4:85249580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:561:5805 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec785d84 r8:00000002 r7:60000113 r6:ec785d8c r5:84b7ec00 r4:84b7ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b7ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec779000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eaf8c r4:858eac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eaf8c r4:853f8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7ec00 r8:853f8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8a80 r8:80287e08 r7:ec77de60 r6:853ee180 r5:84b7ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd180 INFO: task kworker/1:561:5805 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8ad39000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/1:562:5806 blocked for more than 468 seconds. r5:84b7d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:858eb38c r4:853f8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7d400 r8:853f8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8b00 r8:80287e08 r7:ec785e60 r6:853ee200 r5:84b7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd140 INFO: task kworker/1:562:5806 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8ad39000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:5808 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:5808 tgid:5808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84b7e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f078c r4:858f0400 r7:ddde2d80 r6:83018200 r5:858f078c r4:853f8b80 r10:00000000 r9:853f8b80 r8:80287e08 r7:ec78de60 r6:853ee280 r5:84b7e000 Workqueue: events bpf_prog_free_deferred dd20: 8aed9000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 r5:84b79800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd5c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b79800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec799000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858eb78c r4:858eb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858eb78c r4:853f8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b79800 r8:853f8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8c00 r8:80287e08 r7:ec79de60 r6:853ee300 r5:84b79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd3c0 INFO: task kworker/1:564:5811 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8b51f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r5:84b78c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858ebb8c r4:858eb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ebb8c r4:853f8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b78c00 r8:853f8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853f8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f8c80 r8:80287e08 r7:ec79de60 r6:853ee380 r5:84b78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b1fb0 to 0xec7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853dd500 INFO: task kworker/1:565:5812 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8b51f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 r5:00001000 r4:ec7b9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85858c00 r8:853f8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:5816 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:5816 tgid:5816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c5d84 r8:00000002 r7:60000013 r6:ec7c5d8c r5:85859800 r4:85859800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85859800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dd900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85859800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f038c r4:858f0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:5819 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:5819 tgid:5819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d1d84 r8:00000002 r7:60000013 r6:ec7d1d8c r5:8585a400 r4:8585a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f0b8c r4:858f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8585a400 r8:853f8f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:568:5819 is blocked on a mutex likely owned by task kworker/0:297:4186. dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec7ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f138c r4:858f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f138c r4:852b1000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585b000 r8:852b102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1000 r8:80287e08 r7:ec7d1e60 r6:852b1080 r5:8585b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ddc00 INFO: task kworker/1:569:5821 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8c022000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 r5:00001000 r4:dfc17000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:5822 blocked for more than 468 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000013 r6:ec755d8c r5:8585bc00 r4:8585bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f0f8c r4:858f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f0f8c r4:852b1100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585bc00 r8:852b112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1100 r8:80287e08 r7:ec7d9e60 r6:852b1180 r5:8585bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ddc00 INFO: task kworker/1:570:5822 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8c335000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541d440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8585d400 r8:853ee42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ee400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee400 r8:80287e08 r7:ec715e60 r6:852b1200 r5:8585d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7fdfb0 to 0xec7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541d840 INFO: task kworker/0:777:5827 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8c74e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541d300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579938c r4:85799000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579938c r4:853ee480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585c800 r8:853ee4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ee480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee480 r8:80287e08 r7:ec715e60 r6:852b1280 r5:8585c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec805fb0 to 0xec805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8541dac0 INFO: task kworker/0:778:5829 is blocked on a mutex likely owned by task kworker/0:297:4186. r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:779 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 r5:00001000 r4:eb477000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579978c r4:85799400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857e0000 r8:853ee52c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5835 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5835 tgid:5835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec809d84 r8:00000002 r7:60000113 r6:ec809d8c r5:857e0c00 r4:857e0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579a38c r4:8579a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579a38c r4:853ee600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e0c00 r8:853ee62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ee600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee600 r8:80287e08 r7:ec715e60 r6:853ee680 r5:857e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec809fb0 to 0xec809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323100 INFO: task kworker/0:780:5835 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8cee3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85799f8c r4:85799c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85799f8c r4:853ee700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e2400 r8:853ee72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ee700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee700 r8:80287e08 r7:ec809e60 r6:853ee780 r5:857e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323100 INFO: task kworker/0:781:5836 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8d32f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:571:5837 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:571 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:857e3000 r4:857e3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb027000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f1f8c r4:858f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f1f8c r4:852b1300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e3000 r8:852b132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1300 r8:80287e08 r7:ec7d9e60 r6:853ee800 r5:857e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b05c0 INFO: task kworker/1:571:5837 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:857e3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b0780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec461000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f178c r4:858f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f178c r4:852b1380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e3c00 r8:852b13ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1380 r8:80287e08 r7:ec819e60 r6:853ee880 r5:857e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec811fb0 to 0xec811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b0640 INFO: task kworker/1:572:5838 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:857e4800 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853234c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579a78c r4:8579a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579a78c r4:853ee900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e4800 r8:853ee92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ee900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ee900 r8:80287e08 r7:ec809e60 r6:853ee980 r5:857e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec815fb0 to 0xec815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323300 INFO: task kworker/0:782:5840 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8deed000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:857e5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853237c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579af8c r4:8579ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579af8c r4:853eea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e5400 r8:853eea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eea00 r8:80287e08 r7:ec815e60 r6:853eea80 r5:857e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323400 INFO: task kworker/0:783:5842 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8deed000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:5844 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec821d84 r8:00000002 r7:60000113 r6:ec821d8c r5:857e6000 r4:857e6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579ab8c r4:8579a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579ab8c r4:853eeb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e6000 r8:853eeb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eeb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eeb00 r8:80287e08 r7:ec81de60 r6:853eeb80 r5:857e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec821fb0 to 0xec821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:784:5844 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8e1ca000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5846 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:857e6c00 r4:857e6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323980 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579b38c r4:8579b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579b38c r4:853eec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e6c00 r8:853eec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eec00 r8:80287e08 r7:ec81de60 r6:853eec80 r5:857e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323780 INFO: task kworker/0:785:5846 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8e1ca000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5848 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5848 tgid:5848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec829d84 r8:00000002 r7:60000113 r6:ec829d8c r5:857e1800 r4:857e1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec23b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579b78c r4:8579b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579b78c r4:853eed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e1800 r8:853eed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eed00 r8:80287e08 r7:ec825e60 r6:853eed80 r5:857e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323940 INFO: task kworker/0:786:5848 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8e613000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:5850 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5850 tgid:5850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec82dd84 r8:00000002 r7:60000013 r6:ec82dd8c r5:857dec00 r4:857dec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec82de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec281000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579bf8c r4:8579bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579bf8c r4:853eee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dec00 r8:853eee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eee00 r8:80287e08 r7:ec829e60 r6:853eee80 r5:857dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323a00 INFO: task kworker/0:787:5850 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8e613000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:5851 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5851 tgid:5851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec835d84 r8:00000002 r7:60000013 r6:ec835d8c r5:849a8000 r4:849a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec269000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8579bb8c r4:8579b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8579bb8c r4:853eef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a8000 r8:853eef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eef00 r8:80287e08 r7:ec82de60 r6:853eef80 r5:849a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec835fb0 to 0xec835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323a00 INFO: task kworker/0:788:5851 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8ea5f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5854 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5854 tgid:5854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec831d84 r8:00000002 r7:60000013 r6:ec831d8c r5:849a8c00 r4:849a8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec831e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acef8c r4:84acec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84acef8c r4:853ea000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a8c00 r8:853ea02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea000 r8:80287e08 r7:ec82de60 r6:853ea080 r5:849a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec831fb0 to 0xec831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85323e40 INFO: task kworker/0:789:5854 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8ea5f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5856 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:849a9800 r4:849a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec41b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a8b8c r4:857a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8b8c r4:853ea100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a9800 r8:853ea12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea100 r8:80287e08 r7:ec831e60 r6:853ea180 r5:849a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9280 INFO: task kworker/0:790:5856 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8eeb8000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:5857 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:5857 tgid:5857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec841d84 r8:00000002 r7:60000013 r6:ec841d8c r5:849aa400 r4:849aa400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849aa400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a838c r4:857a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a838c r4:853ea200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849aa400 r8:853ea22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea200 r8:80287e08 r7:ec83de60 r6:853ea280 r5:849aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec841fb0 to 0xec841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9280 INFO: task kworker/0:791:5857 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8eeb8000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:5860 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:5860 tgid:5860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec845d84 r8:00000002 r7:60000013 r6:ec845d8c r5:849ab000 r4:849ab000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ab000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec845e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec40b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a878c r4:857a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a878c r4:853ea300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ab000 r8:853ea32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea300 r8:80287e08 r7:ec83de60 r6:853ea380 r5:849ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec845fb0 to 0xec845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9340 INFO: task kworker/0:792:5860 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8f1ba000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:5862 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:5862 tgid:5862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:849abc00 r4:849abc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849abc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a8f8c r4:857a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a8f8c r4:853ea400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849abc00 r8:853ea42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea400 r8:80287e08 r7:ec83de60 r6:853ea480 r5:849abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9400 INFO: task kworker/0:793:5862 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8f39d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5863 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:8585ec00 r4:8585ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a938c r4:857a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a938c r4:853ea500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585ec00 r8:853ea52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea500 r8:80287e08 r7:ec849e60 r6:852b1400 r5:8585ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec851fb0 to 0xec851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9700 INFO: task kworker/0:794:5863 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8f8af000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:5867 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec84dd84 r8:00000002 r7:60000013 r6:ec84dd8c r5:8585e000 r4:8585e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8585e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8585e000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9b8c r4:857a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9b8c r4:853ea580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8585e000 r8:853ea5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea580 r8:80287e08 r7:ec851e60 r6:852b1480 r5:8585e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9800 INFO: task kworker/0:795:5867 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8f8af000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:796:5868 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5868 tgid:5868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec855d84 r8:00000002 r7:60000113 r6:ec855d8c r5:85858000 r4:85858000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85858000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e99c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85858000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a978c r4:857a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a978c r4:853ea600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85858000 r8:853ea62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea600 r8:80287e08 r7:ec84de60 r6:852b1500 r5:85858000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9700 INFO: task kworker/0:796:5868 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8fbe9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:5870 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000013 r6:ec85dd8c r5:858e0c00 r4:858e0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea97b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f1b8c r4:858f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f1b8c r4:852b1580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e0c00 r8:852b15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1580 r8:80287e08 r7:ec819e60 r6:852b1600 r5:858e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec85dfb0 to 0xec85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852b0000 INFO: task kworker/1:573:5870 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfc17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:797:5872 blocked for more than 469 seconds. r4:858e0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9f8c r4:857a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9f8c r4:853ea680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e0000 r8:853ea6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea680 r8:80287e08 r7:ec84de60 r6:852b1680 r5:858e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9a40 INFO: task kworker/0:797:5872 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 8ffb2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5874 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:858e1800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857aab8c r4:857aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aab8c r4:853ea700 r10:61c88647 r9:858e1800 r8:853ea72c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:799 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857aa38c r4:857aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa38c r4:853ea780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e3c00 r8:853ea7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea780 r8:80287e08 r7:ec86de60 r6:852b1780 r5:858e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9bc0 INFO: task kworker/0:799:5876 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 90286000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:5877 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:5877 tgid:5877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:858e4800 r4:858e4800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e4800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r5:857aa78c r4:857aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa78c r4:853ea800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e4800 r8:853ea82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:853ea800 r8:80287e08 r7:ec86de60 r6:852b1800 r5:858e4800 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:801 state:D stack:0 pid:5880 tgid:5880 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 r5:857ab38c r4:857ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ab38c r4:853ea880 r10:61c88647 r9:858e3000 r8:853ea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853e9f40 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9081a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:802:5881 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:802 state:D stack:0 pid:5881 tgid:5881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec885d84 r8:00000002 r7:60000013 r6:ec885d8c r5:858e5400 r4:858e5400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e5400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec885e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85323f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec887000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aaf8c r4:857aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aaf8c r4:853ea900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e5400 r8:853ea92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ea900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ea900 r8:80287e08 r7:ec881e60 r6:852b1900 r5:858e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec885fb0 to 0xec885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9f40 INFO: task kworker/0:802:5881 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:858e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:857ab78c r4:857ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858e6000 r8:853ea9ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:804:5886 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:804 state:D stack:0 pid:5886 tgid:5886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec839d84 r8:00000002 r7:60000013 r6:ec839d8c r5:849aec00 r4:849aec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849aec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec839e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ff3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857abb8c r4:857ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857abb8c r4:853eaa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849aec00 r8:853eaa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eaa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eaa00 r8:80287e08 r7:ec89de60 r6:853eaa80 r5:849aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec839fb0 to 0xec839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ff180 INFO: task kworker/0:804:5886 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9117f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:805:5887 blocked for more than 469 seconds. r4:849ad400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 r5:00001000 r4:ec8a3000 r5:857abf8c r4:857abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853eab80 Exception stack(0xec859fb0 to 0xec859ff8) r4:856ff080 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:5890 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:806 state:D stack:0 pid:5890 tgid:5890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8add84 r8:00000002 r7:60000013 r6:ec8add8c r5:84b88000 r4:84b88000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b88000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ff700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b88000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560038c r4:85600000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560038c r4:853eab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b88000 r8:853eab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eab00 r8:80287e08 r7:ec859e60 r6:853eac80 r5:84b88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ff500 INFO: task kworker/0:806:5890 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 91bab000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:00001000 r4:dfc17000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:807:5892 blocked for more than 469 seconds. r4:84b88c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r9:83018005 r8:84b88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r5:85600b8c r4:85600800 r7:dddced80 r6:83018000 r5:85600b8c r4:853ead00 r10:00000000 r9:853ead00 r8:80287e08 r7:ec8ade60 r6:853ead80 r5:84b88c00 r4:856ff6c0 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:808:5895 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:808 state:D stack:0 pid:5895 tgid:5895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:84b89800 r4:84b89800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b89800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ff800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b89800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560078c r4:85600400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560078c r4:853eae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b89800 r8:853eae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eae00 r8:80287e08 r7:ec871e60 r6:853eae80 r5:84b89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b5fb0 to 0xec8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ff780 INFO: task kworker/0:808:5895 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 92250000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5896 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:84b8a400 r4:84b8a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ffb00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85600f8c r4:85600c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85600f8c r4:853eaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8a400 r8:853eaf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eaf00 r8:80287e08 r7:ec871e60 r6:853eaf80 r5:84b8a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856ff940 INFO: task kworker/0:809:5896 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 92635000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:810:5898 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:810 state:D stack:0 pid:5898 tgid:5898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c9d84 r8:00000002 r7:60000113 r6:ec8c9d8c r5:84b8b000 r4:84b8b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8b000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560138c r4:85601000 r7:dddced80 r6:83018000 r5:8560138c r4:856f2000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b8bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r5:858f238c r4:858f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f238c r4:852b1a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8bc00 r8:852b1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1a00 r8:80287e08 r7:ec819e60 r6:856f2100 r5:84b8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9d00 INFO: task kworker/1:574:5903 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 92902000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:5905 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:5905 tgid:5905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec701d84 r8:00000002 r7:60000013 r6:ec701d8c r5:84b8e000 r4:84b8e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ffe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec129000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f2f8c r4:858f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f2f8c r4:852b1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8e000 r8:852b1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1a80 r8:80287e08 r7:ec6a1e60 r6:856f2180 r5:84b8e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9d00 INFO: task kworker/1:575:5905 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 92e9d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:5906 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:84b8c800 r4:84b8c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:858f278c r4:858f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f278c r4:852b1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8c800 r8:852b1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:852b1b00 r8:80287e08 r7:ec701e60 r6:856f2200 r5:84b8c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:00000000 r5:00001000 r4:dfc17000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f99c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f2b8c r4:858f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f2b8c r4:852b1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8d400 r8:852b1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1b80 r8:80287e08 r7:ec701e60 r6:856f2280 r5:84b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec781fb0 to 0xec781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9980 INFO: task kworker/1:577:5908 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 931fa000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:5910 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:5910 tgid:5910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:84b8ec00 r4:84b8ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856f9400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f338c r4:858f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f338c r4:852b1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8ec00 r8:852b1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1c00 r8:80287e08 r7:ec701e60 r6:856f2300 r5:84b8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856f9840 INFO: task kworker/1:578:5910 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 93437000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:811:5913 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:811 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:849ae000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857182c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560178c r4:85601400 r7:dddced80 r6:83018000 r5:8560178c r4:856f2380 r4:856f2380 Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85718280 INFO: task kworker/0:811:5913 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9388b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5914 blocked for more than 469 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5914 tgid:5914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7a5d84 r8:00000002 r7:60000113 r6:ec7a5d8c r5:849ac800 r4:849ac800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ac800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85718780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec2d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85601b8c r4:85601800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85601b8c r4:856f2480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ac800 r8:856f24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f2480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f2480 r8:80287e08 r7:ec7a1e60 r6:856f2500 r5:849ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a5fb0 to 0xec7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec1d9000 r5:858f378c r4:858f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f378c r4:852b1c80 r10:61c88647 r9:85938000 r8:852b1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:5918 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:5918 tgid:5918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8ddd84 r8:00000002 r7:60000113 r6:ec8ddd8c r5:85938c00 r4:85938c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85938c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85938c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec333000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f3b8c r4:858f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f3b8c r4:852b1d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85938c00 r8:852b1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1d00 r8:80287e08 r7:ec7bde60 r6:856f2600 r5:85938c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fffc0 INFO: task kworker/1:580:5918 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 942c7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85861800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec395e08 r4:00000000 r5:00001000 r4:ec675000 r5:8590178c r4:85901400 r7:ddde2d80 r6:83018200 r5:8590178c r4:852b1d80 r10:61c88647 r9:85861800 r8:852b1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:852b1d80 r8:80287e08 r7:ec8dde60 r6:852b1e00 r5:85861800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec395fb0 to 0xec395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856fffc0 INFO: task kworker/1:581:5920 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 943e0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:813:5921 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:813 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:8593a400 r4:8593a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560278c r4:85602400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560278c r4:856f2680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593a400 r8:856f26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f2680 r10:00000000 r9:856f2680 r8:80287e08 r7:ec7a5e60 r6:856f2700 r5:8593a400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85939800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85939800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85939800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec37d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858f3f8c r4:858f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858f3f8c r4:852b1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85939800 r8:852b1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1e80 r8:80287e08 r7:ec395e60 r6:856f2780 r5:85939800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e9fb0 to 0xec8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572c000 INFO: task kworker/1:582:5923 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 94b57000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:5925 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8f1d84 r8:00000002 r7:60000113 r6:ec8f1d8c r5:8593c800 r4:8593c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c2c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8593c800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590038c r4:85900000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590038c r4:852b1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593c800 r8:852b1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1f00 r8:80287e08 r7:ec395e60 r6:856f2800 r5:8593c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f1fb0 to 0xec8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:584:5928 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:584 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8fdd84 r8:00000002 r7:60000113 r6:ec8fdd8c r5:8593bc00 r4:8593bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c3c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8593bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590078c r4:85900400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590078c r4:852b1f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593bc00 r8:852b1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b1f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b1f80 r8:80287e08 r7:ec395e60 r6:856f2880 r5:8593bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572c500 INFO: task kworker/1:584:5928 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9537c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:5929 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec765d84 r8:00000002 r7:60000113 r6:ec765d8c r5:85862400 r4:85862400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85862400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c480 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85862400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85900b8c r4:85900800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85900b8c r4:856f4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85862400 r8:856f402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4000 r8:80287e08 r7:ec395e60 r6:856f4080 r5:85862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec765fb0 to 0xec765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572c640 INFO: task kworker/1:585:5929 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85249580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85864800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85900f8c r4:85900c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85864800 r8:856f412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:5933 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:5933 tgid:5933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:8593b000 r4:8593b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572c900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8593b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec65b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590138c r4:85901000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590138c r4:856f4200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593b000 r8:856f422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4200 r8:80287e08 r7:ec395e60 r6:856f2900 r5:8593b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572c640 INFO: task kworker/1:587:5933 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 95ad5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5934 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5934 tgid:5934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:8593e000 r4:8593e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572cb40 r5:85901b8c r4:85901800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8593e000 r8:856f29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85718f40 r4:00000000 r4:82ac21e4 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8593ec00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8590278c r4:85902400 r10:61c88647 r9:8593ec00 r8:856f42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:5938 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec915d84 r8:00000002 r7:60000013 r6:ec915d8c r5:85940000 r4:85940000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85940000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8572cc40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85940000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85901f8c r4:85901c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85901f8c r4:856f4300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85940000 r8:856f432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4300 r8:80287e08 r7:ec911e60 r6:856f2b00 r5:85940000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572ca40 INFO: task kworker/1:589:5938 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 964f7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec8f9d84 r8:00000002 r7:60000013 r6:ec8f9d8c r5:85863000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8590238c r4:85902000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85863000 r8:856f43ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4380 r8:80287e08 r7:ec911e60 r6:856f4400 r5:85863000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f9fb0 to 0xec8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8572cbc0 INFO: task kworker/1:590:5941 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 968d8000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r5:85601f8c r4:85601c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85601f8c r4:856f4480 r4:856f4480 Exception stack(0xec919fb0 to 0xec919ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 r5:00001000 r4:dfc17000 r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:5945 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec909d84 r8:00000002 r7:60000113 r6:ec909d8c r5:85866c00 r4:85866c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85866c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540b000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85866c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85902b8c r4:85902800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85902b8c r4:856f4580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85866c00 r8:856f45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8572ce40 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 r4:85865400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r9:83018205 r8:85865400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec735000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85902f8c r4:85902c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85902f8c r4:856f4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85865400 r8:856f46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4680 r8:80287e08 r7:ec919e60 r6:856f4700 r5:85865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540b100 INFO: task kworker/1:593:5947 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 96ff8000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:5949 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:5949 tgid:5949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec90dd84 r8:00000002 r7:60000013 r6:ec90dd8c r5:85863c00 r4:85863c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85863c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85863c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec717000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560238c r4:85602000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560238c r4:856f4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85863c00 r8:856f47ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4780 r8:80287e08 r7:ec921e60 r6:856f4800 r5:85863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec90dfb0 to 0xec90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540b140 INFO: task kworker/1:594:5949 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:815 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:85860c00 r4:85860c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85860c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525f7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560378c r4:85603400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560378c r4:856f2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85860c00 r8:856f2bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:856f2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f2b80 r8:80287e08 r7:ec8e1e60 r6:856f4900 r5:85860c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:595 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858e6c00 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec747000 r5:8590338c r4:85903000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:858e6c00 r8:856f48ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540b540 INFO: task kworker/1:595:5954 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9766a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:5955 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:5955 tgid:5955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec935d84 r8:00000002 r7:60000013 r6:ec935d8c r5:85860000 r4:85860000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85860000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec935e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85860000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:85903b8c r4:85903800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85903b8c r4:856f4a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85860000 r8:856f4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4a00 r8:80287e08 r7:ec931e60 r6:856f4a80 r5:85860000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec935fb0 to 0xec935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540b540 INFO: task kworker/1:596:5955 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 97c32000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:816:5957 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:816 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec929d84 r8:00000002 r7:60000013 r6:ec929d8c r5:85948000 r4:85948000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85948000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560338c r4:85603000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856f2c00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 97c32000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:5958 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:5958 tgid:5958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec925d84 r8:00000002 r7:60000113 r6:ec925d8c r5:85948c00 r4:85948c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85948c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540ba80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85948c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec759000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590378c r4:85903400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590378c r4:856f4b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85948c00 r8:856f4bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4b80 r8:80287e08 r7:ec935e60 r6:856f4c00 r5:85948c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540bbc0 INFO: task kworker/1:597:5958 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 97fd4000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:5961 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec939d84 r8:00000002 r7:60000113 r6:ec939d8c r5:85949800 r4:85949800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85949800 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540bf40 r5:00001000 r4:ec789000 r5:8590c38c r4:8590c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590c38c r4:856f4c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 97fd4000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:5962 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:5962 tgid:5962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec93dd84 r8:00000002 r7:60000013 r6:ec93dd8c r5:8594a400 r4:8594a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec93de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540bd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec775000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85903f8c r4:85903c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85903f8c r4:856f4d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594a400 r8:856f4dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4d80 r8:80287e08 r7:ec939e60 r6:856f4e00 r5:8594a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec93dfb0 to 0xec93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540bc00 INFO: task kworker/1:599:5962 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9834f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r9:83018205 r8:8594b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:8590c78c r4:8590c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8594b000 r8:856f4eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:5968 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:8594bc00 r4:8594bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fd000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590cb8c r4:8590c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590cb8c r4:856f4f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594bc00 r8:856f4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856f4f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856f4f80 r8:80287e08 r7:ec941e60 r6:8532a000 r5:8594bc00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec7cb000 r5:8590d38c r4:8590d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8532a080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:603:5971 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:603 state:D stack:0 pid:5971 tgid:5971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:8594d400 r4:8594d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec94de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fd1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590cf8c r4:8590cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590cf8c r4:8532a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594d400 r8:8532a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a180 r8:80287e08 r7:ec945e60 r6:8532a200 r5:8594d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec94dfb0 to 0xec94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fd4c0 INFO: task kworker/1:603:5971 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 984a2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:5973 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec951d84 r8:00000002 r7:60000013 r6:ec951d8c r5:8594e000 r4:8594e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fd9c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec969000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590e38c r4:8590e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590e38c r4:8532a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594e000 r8:8532a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a280 r8:80287e08 r7:ec945e60 r6:8532a300 r5:8594e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec951fb0 to 0xec951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fd340 INFO: task kworker/1:604:5973 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 98b6b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:5975 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:5975 tgid:5975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec955d84 r8:00000002 r7:60000113 r6:ec955d8c r5:8594ec00 r4:8594ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec955e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fd540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590d78c r4:8590d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590d78c r4:8532a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594ec00 r8:8532a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a380 r8:80287e08 r7:ec951e60 r6:8532a400 r5:8594ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec955fb0 to 0xec955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fd680 INFO: task kworker/1:605:5975 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 98b6b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:5976 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:5976 tgid:5976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec95dd84 r8:00000002 r7:60000113 r6:ec95dd8c r5:85868000 r4:85868000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85868000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fd6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85868000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590db8c r4:8590d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590db8c r4:8532a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85868000 r8:8532a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a480 r8:80287e08 r7:ec951e60 r6:8532a500 r5:85868000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec95dfb0 to 0xec95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fd800 INFO: task kworker/1:606:5976 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 98ee2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:5978 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:5978 tgid:5978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec96dd84 r8:00000002 r7:60000013 r6:ec96dd8c r5:85941800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590df8c r4:8590dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590df8c r4:8532a580 r10:61c88647 r9:85941800 r8:8532a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec96dfb0 to 0xec96dff8) r4:853fda00 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018205 r8:85943c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 r5:8590e78c r4:8590e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590e78c r4:8532a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85943c00 r8:8532a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a600 r8:80287e08 r7:ec951e60 r6:856f2d00 r5:85943c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec985fb0 to 0xec985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fdc80 INFO: task kworker/1:608:5981 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 99307000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:609:5983 blocked for more than 470 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fdd00 r5:8590eb8c r4:8590e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590eb8c r4:8532a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85940c00 r8:8532a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a680 r8:80287e08 r7:ec985e60 r6:856f2d80 r5:85940c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fdc40 INFO: task kworker/1:609:5983 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 99307000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5985 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:5985 tgid:5985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:85945400 r4:85945400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85945400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8590f38c r4:8590f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590f38c r4:8532a700 r10:61c88647 r9:85945400 r8:8532a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:611:5987 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:611 state:D stack:0 pid:5987 tgid:5987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:85946000 r4:85946000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85946000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fde00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85946000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590ef8c r4:8590ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590ef8c r4:8532a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85946000 r8:8532a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a780 r8:80287e08 r7:ec99de60 r6:856f2e80 r5:85946000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fdf00 INFO: task kworker/1:611:5987 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 996bf000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:5989 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:5989 tgid:5989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9b5d84 r8:00000002 r7:60000113 r6:ec9b5d8c r5:85944800 r4:85944800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85944800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85944800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590f78c r4:8590f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590f78c r4:8532a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85944800 r8:8532a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a800 r8:80287e08 r7:ec99de60 r6:856f2f00 r5:85944800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852ae280 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/1:613:5991 blocked for more than 470 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9bdd84 r8:00000002 r7:60000013 r6:ec9bdd8c r5:85942400 r4:85942400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85942400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9bde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85942400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8590fb8c r4:8590f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8590fb8c r4:8532a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85942400 r8:8532a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a880 r8:80287e08 r7:ec9b5e60 r6:856f2f80 r5:85942400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec9e1000 r5:8591478c r4:85914400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591478c r4:8532a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85946c00 r8:8532a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532a900 r8:80287e08 r7:ec9bde60 r6:85262000 r5:85946c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae300 INFO: task kworker/1:614:5993 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9a234000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:615 state:D stack:0 pid:5995 tgid:5995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9d5d84 r8:00000002 r7:60000013 r6:ec9d5d8c r5:85943000 r4:85943000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85943000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8590ff8c r4:8590fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85943000 r8:8532a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85602b8c r4:85602800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85602b8c r4:8532aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586a400 r8:8532aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532aa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532aa00 r8:80287e08 r7:ec9c9e60 r6:8532aa80 r5:8586a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec991fb0 to 0xec991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae100 INFO: task kworker/1:616:5996 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9a234000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 r5:8586bc00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b05d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae538c r4:85ae5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ae538c r4:8532ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586bc00 r8:8532ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532ab00 r8:80287e08 r7:ec9c9e60 r6:8532ab80 r5:8586bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b9fb0 to 0xec9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852ae680 INFO: task kworker/1:617:5999 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9a480000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb3c9000 r5:85914b8c r4:85914800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8586c800 r8:8532ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec9e5fb0 to 0xec9e5ff8) r4:852ae9c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:6006 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec961d84 r8:00000002 r7:60000013 r6:ec961d8c r5:8586d400 r4:8586d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aea40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85914f8c r4:85914c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85914f8c r4:8532ad00 r10:61c88647 r9:8586d400 r8:8532ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:852ae9c0 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:6007 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:6007 tgid:6007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9f1d84 r8:00000002 r7:60000113 r6:ec9f1d8c r5:8586e000 r4:8586e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85915b8c r4:85915800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8586e000 r8:8532ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:6008 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9f5d84 r8:00000002 r7:60000113 r6:ec9f5d8c r5:8586ec00 r4:8586ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85267d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8586ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec889000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591538c r4:85915000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591538c r4:8532af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586ec00 r8:8532af2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8532af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8532af00 r8:80287e08 r7:ec9f1e60 r6:8532af80 r5:8586ec00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:852ae9c0 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85869800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85603b8c r4:85603800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603b8c r4:85262100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85869800 r8:8526212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262100 r8:80287e08 r7:ec92de60 r6:85255000 r5:85869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525f900 INFO: task kworker/0:817:6010 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9afbd000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:818:6013 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:818 state:D stack:0 pid:6013 tgid:6013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:85958000 r4:85958000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85958000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85603f8c r4:85603c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85958000 r8:852621ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:819:6014 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:819 state:D stack:0 pid:6014 tgid:6014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:85958c00 r4:85958c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85958c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525fbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85958c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84acf38c r4:84acf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84acf38c r4:85262200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85958c00 r8:8526222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262200 r8:80287e08 r7:eca05e60 r6:85255100 r5:85958c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca09fb0 to 0xeca09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525f9c0 INFO: task kworker/0:819:6014 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9afbd000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca0dd84 r8:00000002 r7:60000013 r6:eca0dd8c r5:85959800 r4:85959800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85959800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525fdc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85959800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec231000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591c38c r4:8591c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591c38c r4:85262280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85959800 r8:852622ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262280 r8:80287e08 r7:eca09e60 r6:85255180 r5:85959800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca0dfb0 to 0xeca0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525f9c0 INFO: task kworker/0:820:6016 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9b494000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:821:6018 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8595bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:8591c78c r4:8591c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591c78c r4:85262300 r4:85262300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525fd80 INFO: task kworker/0:821:6018 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9b992000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:822:6020 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:822 state:D stack:0 pid:6020 tgid:6020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca1dd84 r8:00000002 r7:60000113 r6:eca1dd8c r5:8595a400 r4:8595a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ff40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8595a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec295000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591cb8c r4:8591c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591cb8c r4:85262380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595a400 r8:852623ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262380 r8:80287e08 r7:eca19e60 r6:85255280 r5:8595a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca1dfb0 to 0xeca1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8525f9c0 INFO: task kworker/0:822:6020 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9b992000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:823:6022 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:823 state:D stack:0 pid:6022 tgid:6022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8595b000 r4:8595b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525fa80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8595b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591cf8c r4:8591cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591cf8c r4:85262400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595b000 r8:8526242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262400 r8:80287e08 r7:eca1de60 r6:85255300 r5:8595b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:eaa3ddc0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:824 state:D stack:0 pid:6025 tgid:6025 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8595c800 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec419000 r5:8591d38c r4:8591d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591d38c r4:85262480 r10:61c88647 r9:8595c800 r8:852624ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeca31fb0 to 0xeca31ff8) r4:8525f6c0 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:825:6026 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:825 state:D stack:0 pid:6026 tgid:6026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9edd84 r8:00000002 r7:60000013 r6:ec9edd8c r5:8593d400 r4:8593d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8593d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852aef80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593d400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec43b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591d78c r4:8591d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591d78c r4:85262500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8593d400 r8:8526252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262500 r8:80287e08 r7:eca31e60 r6:85262580 r5:8593d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9edfb0 to 0xec9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84889ac0 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 Call trace: [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec4ab000 r5:8591db8c r4:8591d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591db8c r4:85262600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84998000 r8:8526262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262600 r8:80287e08 r7:ec9ede60 r6:85262680 r5:84998000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fdc80 INFO: task kworker/0:826:6029 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9c054000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:827:6031 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:827 state:D stack:0 pid:6031 tgid:6031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca39d84 r8:00000002 r7:60000113 r6:eca39d8c r5:8595e000 r4:8595e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8595e000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591df8c r4:8591dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591df8c r4:85262700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595e000 r8:8526272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262700 r8:80287e08 r7:eca2de60 r6:85255400 r5:8595e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a9140 INFO: task kworker/0:827:6031 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9c779000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:828:6032 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r5:8595d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8591e38c r4:8591e000 r7:dddced80 r6:83018000 r5:8591e38c r4:85262780 r10:61c88647 r9:8595d400 r8:852627ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:829:6034 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:829 state:D stack:0 pid:6034 tgid:6034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca45d84 r8:00000002 r7:60000113 r6:eca45d8c r5:85868c00 r4:85868c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85868c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a92c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec51f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591e78c r4:8591e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591e78c r4:85262800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85868c00 r8:8526282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262800 r8:80287e08 r7:eca3de60 r6:85255500 r5:85868c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca45fb0 to 0xeca45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a9440 INFO: task kworker/0:829:6034 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9c779000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85870c00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8591eb8c r4:8591e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85262880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/0:831:6038 blocked for more than 471 seconds. r10:8291a684 r9:eca55d84 r8:00000002 r7:60000113 r6:eca55d8c r5:85871800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9540 r5:8591ef8c r4:8591ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591ef8c r4:85262900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85871800 r8:8526292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262900 r8:80287e08 r7:eca51e60 r6:85255600 r5:85871800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca55fb0 to 0xeca55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a93c0 INFO: task kworker/0:831:6038 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9ce69000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:832:6040 blocked for more than 471 seconds. Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85873000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:8591fb8c r4:8591f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591fb8c r4:85262980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85262980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:6041 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:6041 tgid:6041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca29d84 r8:00000002 r7:60000113 r6:eca29d8c r5:84999800 r4:84999800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84999800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84999800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec80b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591f38c r4:8591f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591f38c r4:85262a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84999800 r8:85262a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262a00 r8:80287e08 r7:eca5de60 r6:85262a80 r5:84999800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a9580 INFO: task kworker/0:833:6041 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9d267000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8499a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r10:61c88647 r9:8499a400 r8:85262b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852a9840 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:6046 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:6046 tgid:6046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca61d84 r8:00000002 r7:60000113 r6:eca61d8c r5:8499bc00 r4:8499bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85267800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8499bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591578c r4:85915400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591578c r4:85255700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499bc00 r8:8525572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85255700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85255700 r8:80287e08 r7:ec9f1e60 r6:85262c00 r5:8499bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca61fb0 to 0xeca61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85267b00 INFO: task kworker/1:622:6046 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9dbbf000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r5:00001000 r4:dfc17000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r5:00001000 r4:ec8c5000 r5:8596438c r4:85964000 r7:dddced80 r6:83018000 r5:8596438c r4:85262c80 Exception stack(0xeca69fb0 to 0xeca69ff8) Workqueue: events bpf_prog_free_deferred dd20: 9dbbf000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:836:6050 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:836 state:D stack:0 pid:6050 tgid:6050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca65d84 r8:00000002 r7:60000113 r6:eca65d8c r5:85870000 r4:85870000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85870000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a9ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85870000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8591ff8c r4:8591fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8591ff8c r4:85262d80 r10:61c88647 r9:85870000 r8:85262dac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:00000000 r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eca6dd84 r8:00000002 r7:60000013 r6:eca6dd8c r5:85873c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85965b8c r4:85965800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85255800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:6054 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:85875400 r4:85875400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85875400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540f440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85875400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85915f8c r4:85915c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85915f8c r4:85255900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85875400 r8:8525592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85255900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85255900 r8:80287e08 r7:eca6de60 r6:85255980 r5:85875400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca75fb0 to 0xeca75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852676c0 INFO: task kworker/1:624:6054 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9e542000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:837:6056 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:837 state:D stack:0 pid:6056 tgid:6056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca81d84 r8:00000002 r7:60000013 r6:eca81d8c r5:85874800 r4:85874800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca81e08 r5:00001000 r4:eca7d000 r5:85964b8c r4:85964800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:6058 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:6058 tgid:6058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca89d84 r8:00000002 r7:60000013 r6:eca89d8c r5:85876000 r4:85876000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85876000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fde80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85876000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596478c r4:85964400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596478c r4:85262e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85876000 r8:85262eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262e80 r8:80287e08 r7:eca81e60 r6:85255a80 r5:85876000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca89fb0 to 0xeca89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852a9180 INFO: task kworker/0:838:6058 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9e96f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:839:6059 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:6059 tgid:6059 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85872400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85964f8c r4:85964c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85964f8c r4:85262f00 r10:61c88647 r9:85872400 r8:85262f2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:6064 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:6064 tgid:6064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca71d84 r8:00000002 r7:60000013 r6:eca71d8c r5:85876c00 r4:85876c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85876c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85876c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596538c r4:85965000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596538c r4:85262f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85876c00 r8:85262fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85262f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85262f80 r8:80287e08 r7:eca91e60 r6:85255b80 r5:85876c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328140 INFO: task kworker/0:840:6064 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:6065 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaadd84 r8:00000002 r7:60000013 r6:ecaadd8c r5:8586b000 r4:8586b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586b000 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596578c r4:85965400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852d5000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac21e4 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:8595ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85965f8c r4:85965c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85965f8c r4:852d5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595ec00 r8:852d50ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5080 r8:80287e08 r7:ecaade60 r6:85255c80 r5:8595ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328540 INFO: task kworker/0:842:6067 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9ee21000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:00001000 r4:dfc17000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r5:8591678c r4:85916400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85255d00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 9f6a8000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018205 r8:85989800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 r5:8591638c r4:85916000 r10:61c88647 r9:85989800 r8:85255e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9f6a8000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:843:6072 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:843 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecacdd84 r8:00000002 r7:60000013 r6:ecacdd8c r5:85988c00 r4:85988c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85988c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328840 r4:00000000 r9:83018005 r8:85988c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r5:8596638c r4:85966000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85988c00 r8:852d512c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Not tainted 6.15.0-rc6-syzkaller #0 r4:8598bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecadde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85966f8c r4:85966c00 r10:61c88647 r9:8598bc00 r8:852d51ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328880 INFO: task kworker/0:844:6074 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9f904000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:845:6075 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:845 state:D stack:0 pid:6075 tgid:6075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecabdd84 r8:00000002 r7:60000013 r6:ecabdd8c r5:8499c800 r4:8499c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8499c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596678c r4:85966400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596678c r4:852d5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499c800 r8:852d522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5200 r8:80287e08 r7:ecadde60 r6:852d5280 r5:8499c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecabdfb0 to 0xecabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328880 INFO: task kworker/0:845:6075 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: 9f904000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:6078 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecad9d84 r8:00000002 r7:60000013 r6:ecad9d8c r5:8499b000 r4:8499b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328bc0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85966b8c r4:85966800 r10:61c88647 r9:8499b000 r8:852d532c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb01e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b05700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8499e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbfb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8591738c r4:85917000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8591738c r4:8571a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499e000 r8:8571a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a000 r8:80287e08 r7:eca85e60 r6:852d5400 r5:8499e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540fcc0 INFO: task kworker/1:627:6080 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a024c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:847:6083 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:847 state:D stack:0 pid:6083 tgid:6083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecafdd84 r8:00000002 r7:60000113 r6:ecafdd8c r5:84998c00 r4:84998c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84998c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecafde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85328c40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84998c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596738c r4:85967000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596738c r4:852d5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84998c00 r8:852d54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5480 r8:80287e08 r7:ecadde60 r6:852d5500 r5:84998c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecafdfb0 to 0xecafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328f00 INFO: task kworker/0:847:6083 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a024c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:6084 blocked for more than 471 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:6084 tgid:6084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb11d84 r8:00000002 r7:60000113 r6:ecb11d8c r5:8499ec00 r4:8499ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8499ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857422c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8499ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85916b8c r4:85916800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85916b8c r4:8571a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8499ec00 r8:8571a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8571a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a080 r8:80287e08 r7:ecb01e60 r6:852d5580 r5:8499ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb11fb0 to 0xecb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540ffc0 INFO: task kworker/1:628:6084 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a059d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:6086 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:6086 tgid:6086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae5d84 r8:00000002 r7:60000113 r6:ecae5d8c r5:858e2400 r4:858e2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:858e2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85700040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:858e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596778c r4:85967400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596778c r4:852d5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:858e2400 r8:852d562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5600 r8:80287e08 r7:ecafde60 r6:852d5680 r5:858e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae5fb0 to 0xecae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85328fc0 INFO: task kworker/0:848:6086 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a094a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:849:6089 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:849 state:D stack:0 pid:6089 tgid:6089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb29d84 r8:00000002 r7:60000113 r6:ecb29d8c r5:8598c800 r4:8598c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85700140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8598c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85967b8c r4:85967800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85967b8c r4:852d5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598c800 r8:852d572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5700 r8:80287e08 r7:ecae5e60 r6:8571a100 r5:8598c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb29fb0 to 0xecb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85700280 INFO: task kworker/0:849:6089 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a0c5a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85967f8c r4:85967c00 r4:852d5780 9fa0: 00000000 00000000 00000000 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:851:6092 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:851 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb25d84 r8:00000002 r7:60000013 r6:ecb25d8c r5:850b0c00 r4:850b0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85700440 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8596c38c r4:8596c000 r10:61c88647 r9:850b0c00 r8:852d58ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r5:8596c78c r4:8596c400 r7:dddced80 r6:83018000 r5:8596c78c r4:852d5980 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:853:6096 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:853 state:D stack:0 pid:6096 tgid:6096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb3dd84 r8:00000002 r7:60000113 r6:ecb3dd8c r5:850b2400 r4:850b2400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b2400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb3de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85700a00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596cf8c r4:8596cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596cf8c r4:852d5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b2400 r8:852d5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5a80 r8:80287e08 r7:ecb31e60 r6:852d5b00 r5:850b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb3dfb0 to 0xecb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85700540 INFO: task kworker/0:853:6096 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8596cb8c r4:8596c800 r10:61c88647 r9:850b4800 r8:852d5bac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:629 state:D stack:0 pid:6100 tgid:6100 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r9:83018205 r8:8598e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 r5:85916f8c r4:85916c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8598e000 r8:8571a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85742280 INFO: task kworker/1:629:6100 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a18b5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:6103 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 r5:00001000 r4:ecb6f000 r5:8596d78c r4:8596d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596d78c r4:852d5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598d400 r8:852d5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5c80 r8:80287e08 r7:ecb3de60 r6:8571a280 r5:8598d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857009c0 INFO: task kworker/0:855:6103 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a18b5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 Call trace: [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8598b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 r5:8596d38c r4:8596d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8598b000 r8:852d5dac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85700a80 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: a1e9e000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:857:6107 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:857 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec971d84 r8:00000002 r7:60000113 r6:ec971d8c r5:85878c00 r4:85878c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85878c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85700d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596db8c r4:8596d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596db8c r4:852d5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85878c00 r8:852d5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5d00 r8:80287e08 r7:ecb6de60 r6:8571a380 r5:85878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec971fb0 to 0xec971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85700fc0 INFO: task kworker/0:857:6107 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a1e9e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:858:6109 blocked for more than 472 seconds. r10:8291a684 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:8587a400 r4:00000000 r4:00000000 r5:00001000 r4:eafd5000 r5:8596df8c r4:8596dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8587a400 r8:852d5e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:6110 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:6110 tgid:6110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9a5d84 r8:00000002 r7:60000113 r6:ec9a5d8c r5:85878000 r4:85878000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85878000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85878000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596eb8c r4:8596e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596eb8c r4:852d5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85878000 r8:852d5eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5e80 r8:80287e08 r7:ec98de60 r6:8571a480 r5:85878000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a5fb0 to 0xec9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85700e00 INFO: task kworker/0:859:6110 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a2777000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85272f8c r4:85272c00 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:860:6111 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:8587b000 r5:8587b000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540fe40 r5:8596e38c r4:8596e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8587b000 r8:852d5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:852d5f00 r8:80287e08 r7:ec9a5e60 r6:8571a500 r5:8587b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8540f1c0 INFO: task kworker/0:860:6111 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a2777000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:6113 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:6113 tgid:6113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb89d84 r8:00000002 r7:60000013 r6:ecb89d8c r5:85879800 r4:85879800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85879800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85879800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596e78c r4:8596e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596e78c r4:852d5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85879800 r8:852d5fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852d5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d5f80 r8:80287e08 r7:ec9a5e60 r6:8571a580 r5:85879800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755080 INFO: task kworker/0:861:6113 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a2777000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:862:6115 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb91d84 r8:00000002 r7:60000013 r6:ecb91d8c r5:8587d400 r4:8587d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8587d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec1e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596f38c r4:8596f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596f38c r4:85769000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587d400 r8:8576902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769000 r8:80287e08 r7:ec9a5e60 r6:8571a600 r5:8587d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755080 INFO: task kworker/0:862:6115 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a30ee000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:863:6117 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:863 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:8587e000 r4:8587e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8587e000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec19d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596ef8c r4:8596ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596ef8c r4:85769080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587e000 r8:857690ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769080 r8:80287e08 r7:ecb91e60 r6:8571a680 r5:8587e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857551c0 INFO: task kworker/0:863:6117 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a3388000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:6120 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:8587bc00 r4:8587bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8587bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857554c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8587bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec30f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596f78c r4:8596f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596f78c r4:85769100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8587bc00 r8:8576912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769100 r8:80287e08 r7:ecb91e60 r6:8571a700 r5:8587bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba5fb0 to 0xecba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755540 INFO: task kworker/0:864:6120 is blocked on a mutex likely owned by task kworker/0:297:4186. [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8598a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596ff8c r4:8596fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8596ff8c r4:85769180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598a400 r8:857691ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769180 r8:80287e08 r7:ecba5e60 r6:8571a780 r5:8598a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbadfb0 to 0xecbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755500 INFO: task kworker/0:865:6122 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a3885000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8596fb8c r4:8596f800 r10:61c88647 r9:85920000 r8:8576922c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85920c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85920c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85970f8c r4:85970c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85970f8c r4:85769280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85920c00 r8:857692ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769280 r8:80287e08 r7:ecbade60 r6:8571a880 r5:85920c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755640 INFO: task kworker/0:867:6125 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a3d70000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:6127 blocked for more than 472 seconds. Call trace: r5:85922400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597038c r4:85970000 r7:dddced80 r6:83018000 r5:8597038c r4:85769300 r10:00000000 r9:85769300 r8:80287e08 r7:ecbb9e60 r6:8571a900 r5:85922400 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:869:6130 blocked for more than 472 seconds. r4:85923000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8597078c r4:85970400 r7:dddced80 r6:83018000 r5:8597078c r4:85769380 r4:00000001 r4:85755a80 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:6133 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd1d84 r8:00000002 r7:60000113 r6:ecbd1d8c r5:85925400 r4:85925400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85925400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85755b80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85925400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec665000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85970b8c r4:85970800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85970b8c r4:85769400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85925400 r8:8576942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769400 r8:80287e08 r7:ecbb9e60 r6:8571aa00 r5:85925400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755bc0 INFO: task kworker/0:870:6133 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a4aee000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:871:6134 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:871 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbd5d84 r8:00000002 r7:60000113 r6:ecbd5d8c r5:85926000 r4:85926000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85926000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85926000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85971b8c r4:85971800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85971b8c r4:85769480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85926000 r8:857694ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769480 r8:80287e08 r7:ecbb9e60 r6:8571aa80 r5:85926000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd5fb0 to 0xecbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85755bc0 INFO: task kworker/0:871:6134 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a4aee000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:872:6136 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:872 state:D stack:0 pid:6136 tgid:6136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbddd84 r8:00000002 r7:60000113 r6:ecbddd8c r5:85926c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597138c r4:85971000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85769500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/0:873:6138 blocked for more than 472 seconds. r4:85924800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8597178c r4:85971400 r7:dddced80 r6:83018000 r5:8597178c r4:85769580 r10:00000000 r9:85769580 r8:80287e08 r7:ecbd5e60 r6:8571ab80 r5:85924800 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a4e49000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:874:6139 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:874 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:85923c00 r4:85923c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85923c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597238c r4:85972000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597238c r4:85769600 r10:61c88647 r9:85923c00 r8:8576962c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf1d84 r8:00000002 r7:60000113 r6:ecbf1d8c r5:85921800 r4:85921800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85921800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85921800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85971f8c r4:85971c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85971f8c r4:85769680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85921800 r8:857696ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769680 r8:80287e08 r7:ecbe9e60 r6:8571ac80 r5:85921800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f0080 INFO: task kworker/0:875:6141 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a527b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 r4:8587ec00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85769700 r8:80287e08 r7:ecbe9e60 r6:8571ad00 r5:8587ec00 dd60: 80230ad0 80239bb0 800b0013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ecc01d84 r8:00000002 r7:60000113 r6:ecc01d8c r5:8587c800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f02c0 r5:8597278c r4:85972400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8587c800 r8:857697ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769780 r8:80287e08 r7:ecbf9e60 r6:8571ad80 r5:8587c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc01fb0 to 0xecc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f01c0 INFO: task kworker/0:877:6145 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a5723000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:6147 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:6147 tgid:6147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85972b8c r4:85972800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85769800 r8:80287e08 r7:ecbf9e60 r6:8571ae00 r5:85a00c00 r4:855f0300 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:879:6149 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:879 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc11d84 r8:00000002 r7:60000113 r6:ecc11d8c r5:85a00000 r4:85a00000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a00000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a00000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec751000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85972f8c r4:85972c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85972f8c r4:85769880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a00000 r8:857698ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769880 r8:80287e08 r7:ecbf9e60 r6:8571ae80 r5:85a00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f0680 INFO: task kworker/0:879:6149 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a5b4f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85a01800 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597338c r4:85973000 r4:85769900 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec797000 r5:85973b8c r4:85973800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85973b8c r4:85769980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a03000 r8:857699ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769980 r8:80287e08 r7:ecbf9e60 r6:8571af80 r5:85a03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f07c0 INFO: task kworker/0:881:6154 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a640b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85a03c00 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85973f8c r4:85973c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-rc6-syzkaller #0 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8f5000 r5:85974f8c r4:85974c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85769a80 r8:80287e08 r7:ecc31e60 r6:857fa080 r5:85a05400 r4:855f09c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:6159 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:884 state:D stack:0 pid:6159 tgid:6159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc39d84 r8:00000002 r7:60000013 r6:ecc39d8c r5:85a06000 r4:85a06000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a06000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a06000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597438c r4:85974000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597438c r4:85769b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a06000 r8:85769b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769b00 r8:80287e08 r7:ecc35e60 r6:857fa100 r5:85a06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f0cc0 INFO: task kworker/0:884:6159 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85243c40 r4:85a04800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8597478c r4:85974400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:6163 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc49d84 r8:00000002 r7:60000113 r6:ecc49d8c r5:85a06c00 r4:85a06c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a06c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85974b8c r4:85974800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85974b8c r4:85769c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a06c00 r8:85769c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769c00 r8:80287e08 r7:ecc35e60 r6:857fa200 r5:85a06c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f0d00 INFO: task kworker/0:886:6163 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a6c1f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8597538c r4:85975000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85769c80 5fa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:888:6168 blocked for more than 472 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:888 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc5dd84 r8:00000002 r7:60000113 r6:ecc5dd8c r5:85a08000 r4:85a08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fb300 r5:85975b8c r4:85975800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85975b8c r4:85769d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a08000 r8:85769d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769d00 r8:80287e08 r7:ecc55e60 r6:857fa300 r5:85a08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857fb280 INFO: task kworker/0:888:6168 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a7171000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85a0a400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec979000 r5:8597578c r4:85975400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85a0a400 r8:85769dac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r5:00001000 r4:dfc17000 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85975f8c r4:85975c00 r10:61c88647 r9:85a09800 r8:85769e2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a76f5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:6174 blocked for more than 472 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc75d84 r8:00000002 r7:60000113 r6:ecc75d8c r5:85a0b000 r4:85a0b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fb600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597678c r4:85976400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597678c r4:85769e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0b000 r8:85769eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769e80 r8:80287e08 r7:ecc69e60 r6:857fa480 r5:85a0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc75fb0 to 0xecc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ecc81d84 r8:00000002 r7:60000113 r6:ecc81d8c r5:85a0c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fb540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597638c r4:85976000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597638c r4:85769f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0c800 r8:85769f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85769f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85769f00 r8:80287e08 r7:ecc75e60 r6:857fa500 r5:85a0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc81fb0 to 0xecc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857fb4c0 INFO: task kworker/0:892:6177 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a7b6d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85976b8c r4:85976800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:8598ec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85976f8c r4:85976c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8598ec00 r8:859f402c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:895:6182 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:895 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:85a0d400 r4:85a0d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a0d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f0f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8597878c r4:85978400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597878c r4:859f4080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xecc99fb0 to 0xecc99ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8597738c r4:85977000 r4:859f4100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:897:6186 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:897 state:D stack:0 pid:6186 tgid:6186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccb5d84 r8:00000002 r7:60000013 r6:eccb5d8c r5:85a10c00 r4:85a10c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a10c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fbbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597778c r4:85977400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597778c r4:859f4180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a10c00 r8:859f41ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4180 r8:80287e08 r7:ecc99e60 r6:857fa780 r5:85a10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb5fb0 to 0xeccb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857fba80 INFO: task kworker/0:897:6186 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a865f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eccb9d84 r8:00000002 r7:60000113 r6:eccb9d8c r5:85a11800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r5:85977b8c r4:85977800 r7:dddced80 r6:83018000 r5:85977b8c r4:859f4200 r4:857fbb40 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85a13000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a13000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccc5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857fbe80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a13000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85977f8c r4:85977c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85977f8c r4:859f4280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a13000 r8:859f42ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4280 r8:80287e08 r7:ecc99e60 r6:857fa880 r5:85a13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc5fb0 to 0xeccc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857fbb40 INFO: task kworker/0:899:6189 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a8d8d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a12400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597838c r4:85978000 r4:859f4300 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3c000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85978b8c r4:85978800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85978b8c r4:859f4380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a13c00 r8:859f43ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4380 r8:80287e08 r7:ecc99e60 r6:857fa980 r5:85a13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce9fb0 to 0xecce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f0e00 INFO: task kworker/0:901:6194 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a923c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:902:6195 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:902 state:D stack:0 pid:6195 tgid:6195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccf1d84 r8:00000002 r7:60000013 r6:eccf1d8c r5:85a15400 r4:85a15400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a15400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3c200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a15400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85978f8c r4:85978c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85978f8c r4:859f4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a15400 r8:859f442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4400 r8:80287e08 r7:ecce9e60 r6:857faa00 r5:85a15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3c0c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:903:6198 blocked for more than 473 seconds. Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597938c r4:85979000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85a16c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca11e08 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3c400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb127000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597978c r4:85979400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597978c r4:859f4500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a16c00 r8:859f452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4500 r8:80287e08 r7:eca01e60 r6:857fab00 r5:85a16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca11fb0 to 0xeca11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3c300 INFO: task kworker/0:904:6200 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: a9ddc000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:6202 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:6202 tgid:6202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85979f8c r4:85979c00 r7:dddced80 r6:83018000 r5:85979f8c r4:859f4580 r10:61c88647 r9:85a14800 r8:859f45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4580 r8:80287e08 r7:eca11e60 r6:857fab80 r5:85a14800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3c440 INFO: task kworker/0:905:6202 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: aa344000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:906:6204 blocked for more than 473 seconds. Call trace: r4:85a02400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccfde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85979b8c r4:85979800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3c840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597a38c r4:8597a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597a38c r4:859f4680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a10000 r8:859f46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4680 r8:80287e08 r7:eca41e60 r6:857fac80 r5:85a10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3c700 INFO: task kworker/0:907:6206 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: aa5a7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r4:00000001 INFO: task kworker/0:908:6208 blocked for more than 473 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec413000 r5:8597b38c r4:8597b000 r10:61c88647 r9:85a18c00 r8:859f472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a3c7c0 Call trace: dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/0:909:6210 blocked for more than 473 seconds. r5:85a1a400 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a3c900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597a78c r4:8597a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597a78c r4:859f4780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1a400 r8:859f47ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4780 r8:80287e08 r7:ecd0de60 r6:857fad80 r5:85a1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd15fb0 to 0xecd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3c7c0 INFO: task kworker/0:909:6210 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: aacdb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:910:6211 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:910 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccd1d84 r8:00000002 r7:60000113 r6:eccd1d8c r5:850b6000 r4:850b6000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:850b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:8597ab8c r4:8597a800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850b6c00 r4:8291a680 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8597af8c r4:8597ac00 r7:dddced80 r6:83018000 r5:8597af8c r4:859f4900 r4:859f4900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4900 r8:80287e08 r7:ecd0de60 r6:859f4980 r5:850b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd19fb0 to 0xecd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a3ca80 INFO: task kworker/0:911:6214 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ab199000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:6217 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd1dd84 r8:00000002 r7:60000113 r6:ecd1dd8c r5:850b3000 r4:850b3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd1de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c040 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597bf8c r4:8597bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:850b3000 r8:859f4a2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:800b0013 r4:80239bb0 r5:00001000 r4:dfc17000 r4:00000001 r4:85243c40 task:kworker/0:913 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec45f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597b78c r4:8597b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597b78c r4:859f4b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b5400 r8:859f4b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4b00 r8:80287e08 r7:ecd1de60 r6:859f4b80 r5:850b5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85823300 INFO: task kworker/0:913:6219 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ab612000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:914:6220 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:914 state:D stack:0 pid:6220 tgid:6220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb61d84 r8:00000002 r7:60000013 r6:ecb61d8c r5:850b3c00 r4:850b3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85823000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597bb8c r4:8597b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597bb8c r4:859f4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b3c00 r8:859f4c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4c00 r8:80287e08 r7:ecd1de60 r6:859f4c80 r5:850b3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb61fb0 to 0xecb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85823300 INFO: task kworker/0:914:6220 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ab612000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec535000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85200000 r8:859f4d2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r5:00001000 r4:dfc17000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecd2dd84 r8:00000002 r7:60000113 r6:ecd2dd8c r5:85200c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c380 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab878c r4:85ab8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ab878c r4:859f4e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85200c00 r8:859f4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:859f4e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f4e00 r8:80287e08 r7:ecd29e60 r6:859f4e80 r5:85200c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd2dfb0 to 0xecd2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4c180 INFO: task kworker/0:916:6224 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: abfe0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:6227 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:6227 tgid:6227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd31d84 r8:00000002 r7:60000113 r6:ecd31d8c r5:85201800 r4:85201800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85201800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c480 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab8b8c r4:85ab8800 r10:61c88647 r9:85201800 r8:859f4f2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xecd31fb0 to 0xecd31ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: abfe0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:6228 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd35d84 r8:00000002 r7:60000113 r6:ecd35d8c r5:85202400 r4:85202400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ec867000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab8f8c r4:85ab8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a56000 Exception stack(0xecd35fb0 to 0xecd35ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85272f8c r4:85272c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85203000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c7c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85203000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec87d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab938c r4:85ab9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ab938c r4:85a56100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85203000 r8:85a5612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56100 r8:80287e08 r7:ecd35e60 r6:85a56180 r5:85203000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4c600 INFO: task kworker/0:919:6230 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ac347000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:920 state:D stack:0 pid:6232 tgid:6232 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ecd3dd84 r8:00000002 r7:60000013 r6:ecd3dd8c r5:85203c00 r4:85203c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85203c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd3de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4c940 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85203c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec895000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ab978c r4:85ab9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ab978c r4:85a56200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85203c00 r8:85a5622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56200 r8:80287e08 r7:ecd39e60 r6:85a56280 r5:85203c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd3dfb0 to 0xecd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4c700 INFO: task kworker/0:920:6232 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ac9f0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:85204800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a56300 r8:80287e08 r7:ecd3de60 r6:85a56380 r5:85204800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4c880 INFO: task kworker/0:921:6234 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ac9f0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:6236 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd45d84 r8:00000002 r7:60000113 r6:ecd45d8c r5:85205400 r4:85205400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd45e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a56400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85206000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4cb40 INFO: task kworker/0:923:6238 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: accbb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:6240 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:6240 tgid:6240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd4dd84 r8:00000002 r7:60000113 r6:ecd4dd8c r5:85206c00 r4:85206c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85206c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abab8c r4:85aba800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a56600 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85998000 r8:85a5672c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ad867000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:926:6244 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:926 state:D stack:0 pid:6244 tgid:6244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85998c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abb38c r4:85abb000 r7:dddced80 r6:83018000 r5:85abb38c r4:85a56800 r10:00000000 r9:85a56800 r8:80287e08 r7:ecd4de60 r6:85a56880 r5:85998c00 r4:85a63000 Call trace: dd20: ad867000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:927:6245 blocked for more than 473 seconds. r10:8291a684 r9:ecd59d84 r8:00000002 r7:60000013 r6:ecd59d8c r5:85999800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a56900 r8:80287e08 r7:ecd55e60 r6:85a56980 r5:85999800 r4:85a63380 r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ad867000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:6248 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:6248 tgid:6248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd5dd84 r8:00000002 r7:60000013 r6:ecd5dd8c r5:8599a400 r4:8599a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8599a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a634c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8599a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abb78c r4:85abb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85abb78c r4:85a56a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8599a400 r8:85a56a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56a00 r8:80287e08 r7:ecd55e60 r6:85a56a80 r5:8599a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd5dfb0 to 0xecd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85a633c0 INFO: task kworker/0:928:6248 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ad867000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:929:6250 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:929 state:D stack:0 pid:6250 tgid:6250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd61d84 r8:00000002 r7:60000113 r6:ecd61d8c r5:8599b000 r4:8599b000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abbb8c r4:85abb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8599b000 r8:85a56b2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd65d84 r8:00000002 r7:60000013 r6:ecd65d8c r5:8599bc00 r4:8599bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8599bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8599bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85abbf8c r4:85abbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85abbf8c r4:85a56c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8599bc00 r8:85a56c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecd65fb0 to 0xecd65ff8) r4:85a63640 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: adf36000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc6-syzkaller #0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:8599d400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:6258 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:6258 tgid:6258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd71d84 r8:00000002 r7:60000113 r6:ecd71d8c r5:8599e000 r4:8599e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8599e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a63c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8599e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac4b8c r4:85ac4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac4b8c r4:85a56f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8599e000 r8:85a56f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a56f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a56f00 r8:80287e08 r7:ecd69e60 r6:85a56f80 r5:8599e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd71fb0 to 0xecd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a63a40 INFO: task kworker/0:933:6258 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: af076000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243c40 Workqueue: events bpf_prog_free_deferred r5:8599ec00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8599ec00 r8:85a7802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:ecd79d84 r8:00000002 r7:60000113 r6:ecd79d8c r5:859a0000 r4:859a0000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a0000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd79e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841f3580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac538c r4:85ac5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac538c r4:85a78100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a0000 r8:85a7812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78100 r8:80287e08 r7:ecd75e60 r6:85a78180 r5:859a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a63d40 INFO: task kworker/0:935:6262 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: af076000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:6264 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:6264 tgid:6264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd7dd84 r8:00000002 r7:60000013 r6:ecd7dd8c r5:859a0c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859a0c00 r8:85a7822c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: af4ce000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:6266 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:6266 tgid:6266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd81d84 r8:00000002 r7:60000113 r6:ecd81d8c r5:859a1800 r4:859a1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7c240 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac5b8c r4:85ac5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:859a1800 r8:85a7832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78300 r8:80287e08 r7:ecd7de60 r6:85a78380 r5:859a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd81fb0 to 0xecd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7c080 INFO: task kworker/0:937:6266 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: af4ce000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a78400 r8:80287e08 r7:ecd81e60 r6:85a78480 r5:859a2400 Workqueue: events bpf_prog_free_deferred dd20: af4ce000 eab8d000 00000001 80239b98 7f2c7000 00000001 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859a3000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859a3000 r8:85a7852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78500 r8:80287e08 r7:ecd85e60 r6:85a78580 r5:859a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd89fb0 to 0xecd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7c340 INFO: task kworker/0:939:6270 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: af4ce000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac678c r4:85ac6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac678c r4:85a78600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a3c00 r8:85a7862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78600 r8:80287e08 r7:ecd85e60 r6:85a78680 r5:859a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd8dfb0 to 0xecd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7c340 INFO: task kworker/0:940:6272 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b006a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac6b8c r4:85ac6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7c680 INFO: task kworker/0:941:6274 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b006a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b0744000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a7cd80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac778c r4:85ac7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac778c r4:85a78900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a6000 r8:85a7892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78900 r8:80287e08 r7:ecd95e60 r6:85a78980 r5:859a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd99fb0 to 0xecd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7c940 INFO: task kworker/0:943:6278 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b0744000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:944:6279 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a78a00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b0d52000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:6282 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:6282 tgid:6282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecd9dd84 r8:00000002 r7:60000113 r6:ecd9dd8c r5:859a8000 r4:859a8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac7f8c r4:85ac7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a78b00 r8:80287e08 r7:ecd99e60 r6:85a78b80 r5:859a8000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:85249580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:859a8c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a8c00 r8:85a78c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78c00 r8:80287e08 r7:ecd9de60 r6:85a78c80 r5:859a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a7cd40 INFO: task kworker/0:946:6283 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b0d52000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:947:6286 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:947 state:D stack:0 pid:6286 tgid:6286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecda9d84 r8:00000002 r7:60000113 r6:ecda9d8c r5:859a9800 r4:859a9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859a9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad038c r4:85ad0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad038c r4:85a78d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859a9800 r8:85a78d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a78d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a78d00 r8:80287e08 r7:ecd9de60 r6:85a78d80 r5:859a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:859aa400 r8:85a78e2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:6290 blocked for more than 473 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:6290 tgid:6290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdbdd84 r8:00000002 r7:60000113 r6:ecdbdd8c r5:859ab000 r4:859ab000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ab000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad0f8c r4:85ad0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad0f8c r4:85a78f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a78f00 r8:80287e08 r7:ecdb5e60 r6:85a78f80 r5:859ab000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad0b8c r4:85ad0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad0b8c r4:85a95000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859abc00 r8:85a9502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a95000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a95000 r8:80287e08 r7:ecdbde60 r6:85a95080 r5:859abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd1fb0 to 0xecdd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a915c0 INFO: task kworker/0:950:6292 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b16f5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:ecdddd84 r8:00000002 r7:60000013 r6:ecdddd8c r5:859ac800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad138c r4:85ad1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad138c r4:85a95100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ac800 r8:85a9512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a95100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a95100 r8:80287e08 r7:ecdbde60 r6:85a95180 r5:859ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdddfb0 to 0xecdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:859ad400 r8:85a9522c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:6297 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:953 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdc9d84 r8:00000002 r7:60000013 r6:ecdc9d8c r5:859ae000 r4:859ae000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:859ae000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a91a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:859ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad1b8c r4:85ad1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad1b8c r4:85a95300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:859ae000 r8:85a9532c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a95300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a95300 r8:80287e08 r7:ecde5e60 r6:85a95380 r5:859ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc9fb0 to 0xecdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a91780 INFO: task kworker/0:953:6297 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85a95400 r8:80287e08 r7:ecdc9e60 r6:85a95480 r5:859aec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a91a80 INFO: task kworker/0:954:6300 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b2043000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:955:6301 blocked for more than 474 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad238c r4:85ad2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a95500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: b2043000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:ecb95d84 r8:00000002 r7:60000013 r6:ecb95d8c r5:85218c00 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad278c r4:85ad2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad278c r4:85a95600 r10:61c88647 r9:85218c00 r8:85a9562c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85ad2f8c r4:85a95700 r10:00000000 r9:85a95700 r8:80287e08 r7:ecb95e60 r6:85a95780 r5:85219800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a91d00 INFO: task kworker/0:957:6306 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b23bf000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:6307 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ad2b8c r4:85ad2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ad2b8c r4:85a95800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521a400 r8:85a9582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a95800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a95800 r8:80287e08 r7:ecbc9e60 r6:85a95880 r5:8521a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa6080 INFO: task kworker/0:958:6307 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b28de000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:eaa3ddc0 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ad338c r4:85ad3000 r7:dddced80 r6:83018000 r5:85ad338c r4:85a95900 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: b28de000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8521bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r5:00001000 r4:ec5a9000 r5:85ad378c r4:85ad3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a95a00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc1dfb0 to 0xecc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa6480 INFO: task kworker/0:960:6312 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b28de000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ae038c r4:85ae0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85aa6400 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r5:00001000 r4:dfc17000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec663000 r5:85ad3b8c r4:85ad3800 r7:dddced80 r6:83018000 r5:85ad3b8c r4:85a95c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc29fb0 to 0xecc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa6580 INFO: task kworker/0:962:6316 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b312f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:963:6317 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:963 state:D stack:0 pid:6317 tgid:6317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb9dd84 r8:00000002 r7:60000013 r6:ecb9dd8c r5:8521e000 r4:8521e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8521e000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:85ad3f8c r4:85ad3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8521e000 r8:85a95d2c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:964:6320 blocked for more than 474 seconds. r4:8521ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc45e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa6b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae078c r4:85ae0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae078c r4:85a95e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521ec00 r8:85a95e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85a95e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a95e00 r8:80287e08 r7:ecc21e60 r6:85a95e80 r5:8521ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc45fb0 to 0xecc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa6940 INFO: task kworker/0:964:6320 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b359b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec705000 r5:85ae0b8c r4:85ae0800 r7:dddced80 r6:83018000 r5:85ae0b8c r4:85a95f00 Exception stack(0xecc59fb0 to 0xecc59ff8) Workqueue: events bpf_prog_free_deferred dd20: b388e000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:966:6323 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:966 state:D stack:0 pid:6323 tgid:6323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:85bf8c00 r4:85bf8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bf8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540fcc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bf8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec74f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae138c r4:85ae1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae138c r4:85ab6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bf8c00 r8:85ab602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6000 r8:80287e08 r7:ecc59e60 r6:85ab6080 r5:85bf8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85a1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 r5:85ae0f8c r4:85ae0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:968:6328 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:968 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eccd9d84 r8:00000002 r7:60000113 r6:eccd9d8c r5:85a18000 r4:85a18000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a18000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccd9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a18000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec791000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae1b8c r4:85ae1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae1b8c r4:85ab6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a18000 r8:85ab61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6180 r8:80287e08 r7:ecc4de60 r6:857fae80 r5:85a18000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd9fb0 to 0xeccd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa6f40 INFO: task kworker/0:968:6328 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b3ce1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ae178c r4:85ae1400 r10:61c88647 r9:85a19800 r8:85ab622c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: b4390000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ece05d84 r8:00000002 r7:60000013 r6:ece05d8c r5:85a1d400 r4:00000000 r4:00000000 r5:85ae1f8c r4:85ae1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1d400 r8:85ab62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6280 r8:80287e08 r7:eccd9e60 r6:857faf80 r5:85a1d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece05fb0 to 0xece05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af91c0 INFO: task kworker/0:970:6332 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b4390000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:6334 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/0:971 state:D stack:0 pid:6334 tgid:6334 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85ae238c r4:85ae2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae238c r4:85ab6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: dd20: b46e1000 eab8d000 00000001 80239b98 7f2c7000 00000001 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:972:6336 blocked for more than 474 seconds. r4:85a1c800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec8ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85ab6380 Exception stack(0xece11fb0 to 0xece11ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:85272f8c r4:85272c00 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:973:6338 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:973 state:D stack:0 pid:6338 tgid:6338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece15d84 r8:00000002 r7:60000113 r6:ece15d8c r5:85a1e000 r4:85a1e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a1e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece15e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae2f8c r4:85ae2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae2f8c r4:85ab6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1e000 r8:85ab642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6400 r8:80287e08 r7:ece11e60 r6:85b04100 r5:85a1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af9780 INFO: task kworker/0:973:6338 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b4b17000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccbde08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae378c r4:85ab6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a0ec00 r8:85ab64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6480 r8:80287e08 r7:ece15e60 r6:85b04180 r5:85a0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccbdfb0 to 0xeccbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af9840 INFO: task kworker/0:974:6342 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b4efb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:6343 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:6343 tgid:6343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece19d84 r8:00000002 r7:60000013 r6:ece19d8c r5:85a20000 r4:85a20000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a20000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece19e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9a80 r7:dddced80 r6:83018000 r5:85ae338c r4:85ab6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a20000 r8:85ab652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6500 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:82ac21e4 r4:eaa3ddc0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:976:6346 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ece25d84 r8:00000002 r7:60000113 r6:ece25d8c r5:85a20c00 r4:85a20c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a20c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece25e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a8ab00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae4b8c r4:85ae4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae4b8c r4:85ab6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a20c00 r8:85ab65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6580 r8:80287e08 r7:eccbde60 r6:85b04280 r5:85a20c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece25fb0 to 0xece25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af9b80 INFO: task kworker/0:976:6346 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b517e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a22400 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:85ae3b8c r4:85ab6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85af9b80 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:85a21800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r5:00001000 r4:ec9df000 r7:dddced80 r6:83018000 r5:85ae3f8c r4:85ab6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xece31fb0 to 0xece31ff8) r4:85af9c80 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b54e9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:979:6351 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:979 state:D stack:0 pid:6351 tgid:6351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece39d84 r8:00000002 r7:60000113 r6:ece39d8c r5:85a23000 r4:85a23000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a23000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9ec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae438c r4:85ae4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae438c r4:85ab6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a23000 r8:85ab672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6700 r8:80287e08 r7:ece25e60 r6:85b04400 r5:85a23000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece39fb0 to 0xece39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af9d00 INFO: task kworker/0:979:6351 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85249580 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:980 state:D stack:0 pid:6353 tgid:6353 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece41e08 r5:00001000 r4:ecb7d000 r7:dddced80 r6:83018000 r5:85ae478c r4:85ab6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85ab6780 r8:80287e08 r7:ece25e60 r6:85b04480 r5:85a23c00 r4:85af9100 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b5b1b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:981:6355 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:981 state:D stack:0 pid:6355 tgid:6355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece49d84 r8:00000002 r7:60000113 r6:ece49d8c r5:85a26000 r4:85a26000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a26000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0c8c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a26000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae678c r4:85ae6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae678c r4:85ab6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a26000 r8:85ab682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6800 r8:80287e08 r7:ece25e60 r6:85b04500 r5:85a26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:982:6357 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:982 state:D stack:0 pid:6357 tgid:6357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece51d84 r8:00000002 r7:60000013 r6:ece51d8c r5:85a25400 r4:85a25400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a25400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece51e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0c000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a25400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae4f8c r4:85ae4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae4f8c r4:85ab6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a25400 r8:85ab68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6880 r8:80287e08 r7:ece49e60 r6:85b04580 r5:85a25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece51fb0 to 0xece51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a8aec0 INFO: task kworker/0:982:6357 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b62a3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:85a24800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece59e08 r9:83018005 r8:85a24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r7:dddced80 r6:83018000 r5:85ae578c r4:85ab6900 r10:61c88647 r9:85a24800 r8:85ab692c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c0c0 INFO: task kworker/0:983:6359 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b62a3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:6362 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:6362 tgid:6362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85a1bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 r7:dddced80 r6:83018000 r5:85ae5b8c r4:85ab6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a1bc00 r8:85ab69ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: b6423000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:985:6364 blocked for more than 474 seconds. r5:85bfa400 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae5f8c r4:85ae5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae5f8c r4:85ab6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfa400 r8:85ab6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6a00 r8:80287e08 r7:ece49e60 r6:85ab6a80 r5:85bfa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc6dfb0 to 0xecc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c380 INFO: task kworker/0:985:6364 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b6829000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:6367 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:6367 tgid:6367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85bfd400 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85bfd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r5:8591778c r4:85917400 r7:ddde2d80 r6:83018200 r5:8591778c r4:85b04700 r10:61c88647 r9:85bfd400 r8:85b0472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:6370 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:6370 tgid:6370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece09d84 r8:00000002 r7:60000113 r6:ece09d8c r5:85a28c00 r4:85a28c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a28c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0cb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a28c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec3f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae6f8c r4:85ae6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae6f8c r4:85ab6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a28c00 r8:85ab6bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6b80 r8:80287e08 r7:ece49e60 r6:85b04780 r5:85a28c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece09fb0 to 0xece09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0c880 INFO: task kworker/0:986:6370 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:847bab8c r4:85b04800 r4:85b04800 Exception stack(0xeca49fb0 to 0xeca49ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:632 state:D stack:0 pid:6373 tgid:6373 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccede08 r5:00001000 r4:eca13000 r5:85917b8c r4:85917800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85917b8c r4:85b04900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2a400 r8:85b0492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b04900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b04900 r8:80287e08 r7:eca49e60 r6:85b04980 r5:85a2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccedfb0 to 0xeccedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b057c0 INFO: task kworker/1:632:6373 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b6e1f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:987:6375 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:987 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece61d84 r8:00000002 r7:60000113 r6:ece61d8c r5:85bfc800 r4:85bfc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bfc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece61e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85ae6b8c r4:85ab6c00 r4:85ab6c00 Exception stack(0xece61fb0 to 0xece61ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:988 state:D stack:0 pid:6377 tgid:6377 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85ae778c r4:85ab6d00 r10:00000000 r9:85ab6d00 r8:80287e08 r7:ece09e60 r6:85ab6d80 r5:85bfe000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0cc80 INFO: task kworker/0:988:6377 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b7a62000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:989:6379 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:6379 tgid:6379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdf5d84 r8:00000002 r7:60000013 r6:ecdf5d8c r5:85bfec00 r4:85bfec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bfec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0ccc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85ae738c r4:85ab6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfec00 r8:85ab6e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85ab6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85ab6e00 r8:80287e08 r7:eccf9e60 r6:85ab6e80 r5:85bfec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf5fb0 to 0xecdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0ce00 INFO: task kworker/0:989:6379 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b7a62000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85ae7f8c r4:85ab6f00 r10:00000000 r9:85ab6f00 r8:80287e08 r7:eccf9e60 r6:85ab6f80 r5:85bfbc00 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:991:6383 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:991 state:D stack:0 pid:6383 tgid:6383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece6dd84 r8:00000002 r7:60000013 r6:ece6dd8c r5:85bfb000 r4:85bfb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bfb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841f3840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85bfb000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec549000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ae7b8c r4:85ae7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ae7b8c r4:85b18000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bfb000 r8:85b1802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18000 r8:80287e08 r7:ece69e60 r6:85b18080 r5:85bfb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0ce80 INFO: task kworker/0:991:6383 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b7ebb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:6386 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:6386 tgid:6386 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85a2b000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r7:dddced80 r6:83018000 r5:85aec38c r4:85b18100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2b000 r8:85b1812c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85b18100 r8:80287e08 r7:ece69e60 r6:85b04a00 r5:85a2b000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aec78c r4:85aec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aec78c r4:85b18180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a29800 r8:85b181ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18180 r8:80287e08 r7:ece7de60 r6:85b04a80 r5:85a29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c100 INFO: task kworker/0:993:6389 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b83b1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85aecb8c r4:85b18200 r10:00000000 r9:85b18200 r8:80287e08 r7:ece81e60 r6:85b04b00 r5:85a2c800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c440 INFO: task kworker/0:994:6390 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b83b1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:995:6392 blocked for more than 474 seconds. r4:85a2d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r5:00001000 r4:ec8cd000 r7:dddced80 r6:83018000 r5:85aecf8c r4:85b18280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2d400 r8:85b182ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85b18280 r8:80287e08 r7:ece85e60 r6:85b04b80 r5:85a2d400 r4:85b1c500 Call trace: dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1ca80 r5:85aedf8c r4:85aedc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aedf8c r4:85b18300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2e000 r8:85b1832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18300 r8:80287e08 r7:ece89e60 r6:85b04c00 r5:85a2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece8dfb0 to 0xece8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c300 INFO: task kworker/0:996:6394 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b87b6000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:997:6395 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:997 state:D stack:0 pid:6395 tgid:6395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85a2ec00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85aed38c r4:85b18380 r4:85b18380 Exception stack(0xece75fb0 to 0xece75ff8) r4:85b1c240 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:998:6398 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:998 state:D stack:0 pid:6398 tgid:6398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc71d84 r8:00000002 r7:60000113 r6:ecc71d8c r5:85a30000 r4:85a30000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a30000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc71e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1c6c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a30000 r7:00000000 r6:83018000 r5:00001000 r4:7f013000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aed78c r4:85aed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aed78c r4:85b18400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a30000 r8:85b1842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18400 r8:80287e08 r7:ece8de60 r6:85b04d00 r5:85a30000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc71fb0 to 0xecc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c6c0 INFO: task kworker/0:998:6398 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b8c83000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ece1dd84 r8:00000002 r7:60000113 r6:ece1dd8c r5:85a31800 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85aedb8c r4:85b18480 r10:61c88647 r9:85a31800 r8:85b184ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18480 r8:80287e08 r7:ece8de60 r6:85b04d80 r5:85a31800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1c800 INFO: task kworker/0:999:6400 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b929e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1000:6402 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1000 state:D stack:0 pid:6402 tgid:6402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece99d84 r8:00000002 r7:60000113 r6:ece99d8c r5:85a30c00 r4:85a30c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a30c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece99e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b1cbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a30c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85aee38c r4:85b18500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a30c00 r8:85b1852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18500 r8:80287e08 r7:ece8de60 r6:85b04e00 r5:85a30c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece99fb0 to 0xece99ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85b1c940 INFO: task kworker/0:1000:6402 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b929e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1001:6404 blocked for more than 474 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1001 state:D stack:0 pid:6404 tgid:6404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecea1d84 r8:00000002 r7:60000013 r6:ecea1d8c r5:85a32400 r4:85a32400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a32400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85aee78c r4:85b18580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a32400 r8:85b185ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18580 r8:80287e08 r7:ece99e60 r6:85b04e80 r5:85a32400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea1fb0 to 0xecea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cac0 INFO: task kworker/0:1001:6404 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:1002 state:D stack:0 pid:6406 tgid:6406 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85aeeb8c r4:85b18600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a33000 r8:85b1862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18600 r8:80287e08 r7:ecea1e60 r6:85b04f00 r5:85a33000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cc00 INFO: task kworker/0:1002:6406 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: b9866000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r10:8291a684 r9:eceb5d84 r8:00000002 r7:60000013 r6:eceb5d8c r5:85a33c00 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85aef38c r4:85aef000 r7:dddced80 r6:83018000 r5:85aef38c r4:85b18680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85b18680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:1004:6411 blocked for more than 474 seconds. task:kworker/0:1004 state:D stack:0 pid:6411 tgid:6411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceb9d84 r8:00000002 r7:60000013 r6:eceb9d8c r5:85a34800 r4:85a34800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a34800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:841f3ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a34800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec671000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85aeef8c r4:85aeec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85aeef8c r4:85b18700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a34800 r8:85b1872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18700 r8:80287e08 r7:eceb5e60 r6:85b32000 r5:85a34800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b1cf40 INFO: task kworker/0:1004:6411 is blocked on a mutex likely owned by task kworker/0:297:4186. [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ba1ca000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:6413 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85a36000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85aef78c r4:85b18780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a36000 r8:85b187ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:85aefb8c r4:85b18800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85b18800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ba877000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:6417 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:6417 tgid:6417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecec5d84 r8:00000002 r7:60000013 r6:ecec5d8c r5:85a35400 r4:85a35400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a35400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:85aeff8c r4:85b18880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a35400 r8:85b188ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc17000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:85c28000 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85c28000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af078c r4:85af0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af078c r4:85b18900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c28000 r8:85b1892c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18900 r8:80287e08 r7:ecec5e60 r6:85b32200 r5:85c28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b2f1c0 INFO: task kworker/0:1008:6419 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ba877000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:6421 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/0:1009 state:D stack:0 pid:6421 tgid:6421 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85af038c r4:85af0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c28c00 r8:85b189ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1010:6423 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1010 state:D stack:0 pid:6423 tgid:6423 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceadd84 r8:00000002 r7:60000013 r6:eceadd8c r5:84828c00 r4:84828c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84828c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2f840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84828c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0b8c r4:85af0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af0b8c r4:85b18a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85b18a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18a00 r8:80287e08 r7:ecec9e60 r6:85b18a80 r5:84828c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceadfb0 to 0xeceadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b2f680 INFO: task kworker/0:1010:6423 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bb2e3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 r5:84829800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af0f8c r4:85af0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af0f8c r4:85b18b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84829800 r8:85b18b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18b00 r8:80287e08 r7:eceade60 r6:85b18b80 r5:84829800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced5fb0 to 0xeced5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b2fb00 INFO: task kworker/0:1011:6425 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:1012 state:D stack:0 pid:6428 tgid:6428 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced1e08 r5:00001000 r4:ec9ad000 r5:85af178c r4:85af1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b18c00 Exception stack(0xeced1fb0 to 0xeced1ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1013:6429 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1013 state:D stack:0 pid:6429 tgid:6429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eced9d84 r8:00000002 r7:60000013 r6:eced9d8c r5:8482bc00 r4:8482bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af138c r4:85af1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af138c r4:85b18d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482bc00 r8:85b18d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85af1f8c r4:85af1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af1f8c r4:85b18e00 r10:61c88647 r9:8482c800 r8:85b18e2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeceddfb0 to 0xeceddff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd20: bb867000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1015:6433 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1015 state:D stack:0 pid:6433 tgid:6433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee1d84 r8:00000002 r7:60000013 r6:ecee1d8c r5:8482d400 r4:8482d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b2fe00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8482d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af1b8c r4:85af1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af1b8c r4:85b18f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482d400 r8:85b18f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b18f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b18f00 r8:80287e08 r7:ecedde60 r6:85b18f80 r5:8482d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee1fb0 to 0xecee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b2fd40 INFO: task kworker/0:1015:6433 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6435 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6435 tgid:6435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee5d84 r8:00000002 r7:60000013 r6:ecee5d8c r5:8482e000 r4:8482e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8482e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8482e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af238c r4:85af2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af238c r4:85b3e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8482e000 r8:85b3e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e000 r8:80287e08 r7:ecedde60 r6:85b3e080 r5:8482e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee5fb0 to 0xecee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3d080 INFO: task kworker/0:1016:6435 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bbe00000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1017:6437 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1017 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee9d84 r8:00000002 r7:60000113 r6:ecee9d8c r5:8482ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee9e08 r9:83018005 r8:8482ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:85af278c r4:85af2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af278c r4:85b3e100 r10:61c88647 r9:8482ec00 r8:85b3e12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3d300 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 r5:85272f8c r4:85272c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243c40 task:kworker/0:1018 state:D stack:0 pid:6439 tgid:6439 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ecab7000 r5:85af2b8c r4:85af2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8482a400 r8:85b3e22c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85b3e200 r8:80287e08 r7:ecee9e60 r6:85b3e280 r5:8482a400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bc543000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1019:6441 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1019 state:D stack:0 pid:6441 tgid:6441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef1d84 r8:00000002 r7:60000113 r6:ecef1d8c r5:84828000 r4:84828000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84828000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84828000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af2f8c r4:85af2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af2f8c r4:85b3e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84828000 r8:85b3e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e300 r8:80287e08 r7:eceede60 r6:85b3e380 r5:84828000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3d540 INFO: task kworker/0:1019:6441 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bc543000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ecae9000 r5:85af338c r4:85af3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af338c r4:85b3e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a26c00 r8:85b3e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e400 r8:80287e08 r7:ecef1e60 r6:85b3e480 r5:85a26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef5fb0 to 0xecef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3d480 INFO: task kworker/0:1020:6443 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bc543000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1021:6445 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1021 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecef9d84 r8:00000002 r7:60000013 r6:ecef9d8c r5:85a2bc00 r4:85a2bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85a2bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3d800 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af378c r4:85af3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af378c r4:85b3e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85a2bc00 r8:85b3e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e500 r8:80287e08 r7:ecef5e60 r6:85b3e580 r5:85a2bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef9fb0 to 0xecef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3d640 INFO: task kworker/0:1021:6445 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bcd7a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/0:1023:6450 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r4:85220c00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af3b8c r4:85af3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af3b8c r4:85b3e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85220c00 r8:85b3e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e700 r8:80287e08 r7:ecefde60 r6:85b3e780 r5:85220c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3da00 INFO: task kworker/0:1023:6450 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bcd7a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:6451 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85222400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:847bb78c r4:847bb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:1024 state:D stack:0 pid:6453 tgid:6453 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85221800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf0de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3dd00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af3f8c r4:85af3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85af3f8c r4:85b3e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85221800 r8:85b3e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85b3e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b3e880 r8:80287e08 r7:ecefde60 r6:85b3e900 r5:85221800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf0dfb0 to 0xecf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3da40 INFO: task kworker/0:1024:6453 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bd737000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:6455 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:634 state:D stack:0 pid:6455 tgid:6455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf15d84 r8:00000002 r7:60000113 r6:ecf15d8c r5:85223000 r4:85223000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85223000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf15e08 r4:00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eca21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847bb38c r4:847bb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847bb38c r4:85b32380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223000 r8:85b323ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32380 r8:80287e08 r7:eca49e60 r6:85b3e980 r5:85223000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf15fb0 to 0xecf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b33c40 INFO: task kworker/1:634:6455 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bd737000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:635:6475 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:635 state:D stack:0 pid:6475 tgid:6475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf35d84 r8:00000002 r7:60000113 r6:ecf35d8c r5:85226000 r4:85226000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85226000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf35e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5a540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847baf8c r4:847bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b32400 r8:80287e08 r7:eca49e60 r6:85b3eb00 r5:85226000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:6505 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf75d84 r8:00000002 r7:60000113 r6:ecf75d8c r5:85225400 r4:85225400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85225400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf75e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecec0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85225400 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed081000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3c38c r4:85c3c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3c38c r4:85b32480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85225400 r8:85b324ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32480 r8:80287e08 r7:eca49e60 r6:85b3eb80 r5:85225400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf75fb0 to 0xecf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5a5c0 INFO: task kworker/1:636:6505 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:00000000 r5:00001000 r4:dfc17000 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:637:6507 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:637 state:D stack:0 pid:6507 tgid:6507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf7dd84 r8:00000002 r7:60000113 r6:ecf7dd8c r5:85226c00 r4:85226c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85226c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf7de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecd00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85226c00 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed06d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa4b8c r4:84aa4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa4b8c r4:85b32500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85226c00 r8:85b3252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32500 r8:80287e08 r7:ecf75e60 r6:85b3ec00 r5:85226c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf7dfb0 to 0xecf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5a5c0 INFO: task kworker/1:637:6507 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bdd8c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:6622 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:6622 tgid:6622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed085d84 r8:00000002 r7:60000113 r6:ed085d8c r5:84840c00 r4:84840c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84840c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed085e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ecf40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f15f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed07b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:847bbf8c r4:847bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:847bbf8c r4:85b32580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84840c00 r8:85b325ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32580 r8:80287e08 r7:ecf75e60 r6:85b3ec80 r5:84840c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed085fb0 to 0xed085ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eca80 INFO: task kworker/1:638:6622 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: be20b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:639:6624 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:639 state:D stack:0 pid:6624 tgid:6624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed08dd84 r8:00000002 r7:60000013 r6:ed08dd8c r5:84843000 r4:84843000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84843000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed08de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84888580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843000 r7:00000000 r6:83018200 r5:00001000 r4:7f167000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3cf8c r4:85c3cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3cf8c r4:85b32600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84843000 r8:85b3262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32600 r8:80287e08 r7:ecf75e60 r6:85b3ed00 r5:84843000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed08dfb0 to 0xed08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ecd80 INFO: task kworker/1:639:6624 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: be20b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:6626 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:6626 tgid:6626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0a1d84 r8:00000002 r7:60000113 r6:ed0a1d8c r5:84844800 r4:84844800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84844800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec100 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed097000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3c78c r4:85c3c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3c78c r4:85b32680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84844800 r8:85b326ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32680 r8:80287e08 r7:ed08de60 r6:85b3ed80 r5:84844800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0a1fb0 to 0xed0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ecd80 INFO: task kworker/1:640:6626 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bebe1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:6628 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:6628 tgid:6628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0add84 r8:00000002 r7:60000113 r6:ed0add8c r5:84845400 r4:84845400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84845400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848887c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84845400 r7:00000000 r6:83018200 r5:00001000 r4:7f165000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3cb8c r4:85c3c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3cb8c r4:85b32700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84845400 r8:85b3272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32700 r8:80287e08 r7:ed08de60 r6:85b3ee00 r5:84845400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0adfb0 to 0xed0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:848888c0 INFO: task kworker/1:641:6628 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bebe1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:6629 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:6629 tgid:6629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0b1d84 r8:00000002 r7:60000013 r6:ed0b1d8c r5:84846c00 r4:84846c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84846c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84888280 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3d78c r4:85c3d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed0b1fb0 to 0xed0b1ff8) r4:84888680 Call trace: dd20: bebe1000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:643:6632 blocked for more than 475 seconds. r10:8291a684 r9:ed0a5d84 r8:00000002 r7:60000113 r6:ed0a5d8c r5:85c2bc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848883c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c3d38c r4:85b32800 r10:00000000 r9:85b32800 r8:80287e08 r7:ed0b1e60 r6:85b32880 r5:85c2bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:6635 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:6635 tgid:6635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecfe1d84 r8:00000002 r7:60000013 r6:ecfe1d8c r5:85c2d400 r4:85c2d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c2d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfe1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f16d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3db8c r4:85c3d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3db8c r4:85b32900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c2d400 r8:85b3292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32900 r8:80287e08 r7:ed0b1e60 r6:85b32980 r5:85c2d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe1fb0 to 0xecfe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84888200 INFO: task kworker/1:644:6635 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bf223000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85c2a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0bde08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85c2a400 r8:85b32a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:6639 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:6639 tgid:6639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed0e1d84 r8:00000002 r7:60000013 r6:ed0e1d8c r5:85c2b000 r4:85c2b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c2b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0e1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad4580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f171000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c50f8c r4:85c50c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c50f8c r4:85b32b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c2b000 r8:85b32b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32b00 r8:80287e08 r7:ed0bde60 r6:85b32b80 r5:85c2b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84842400 r8:85b32c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:648 state:D stack:0 pid:6643 tgid:6643 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85c3e78c r4:85b32c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: bfb6e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:6645 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:6645 tgid:6645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed105d84 r8:00000002 r7:60000113 r6:ed105d8c r5:84843c00 r4:84843c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84843c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed105e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b742c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f179000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed10d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3ef8c r4:85c3ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3ef8c r4:85b32d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84843c00 r8:85b32d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32d00 r8:80287e08 r7:ed0fde60 r6:85b68000 r5:84843c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed105fb0 to 0xed105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b740c0 INFO: task kworker/1:649:6645 is blocked on a mutex likely owned by task kworker/0:297:4186. Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:650:6646 blocked for more than 475 seconds. r5:85bf9800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed111fb0 to 0xed111ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r5:85272f8c r4:85272c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85223c00 r4:8291a680 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b74600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85223c00 r7:00000000 r6:83018200 r5:00001000 r4:7f17d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3f78c r4:85c3f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3f78c r4:85b32e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223c00 r8:85b32e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32e00 r8:80287e08 r7:ed105e60 r6:85b68100 r5:85223c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed11dfb0 to 0xed11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b741c0 INFO: task kworker/1:651:6648 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c064e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:6650 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:6650 tgid:6650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed125d84 r8:00000002 r7:60000013 r6:ed125d8c r5:85510c00 r4:85510c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85510c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed125e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b744c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f17b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed127000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c3f38c r4:85c3f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3f38c r4:85b32e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85510c00 r8:85b32eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32e80 r8:80287e08 r7:ed11de60 r6:85b68180 r5:85510c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed125fb0 to 0xed125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:653:6653 blocked for more than 475 seconds. r10:8291a684 r9:ed135d84 r8:00000002 r7:60000113 r6:ed135d8c r5:85511800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 r4:00000000 r5:85c3ff8c r4:85c3fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3ff8c r4:85b32f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85511800 r8:85b32f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b32f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b32f00 r8:80287e08 r7:ed11de60 r6:85b68200 r5:85511800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed135fb0 to 0xed135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b74540 INFO: task kworker/1:653:6653 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c0aed000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:6655 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:6655 tgid:6655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed141d84 r8:00000002 r7:60000113 r6:ed141d8c r5:85512400 r4:85512400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85512400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed141e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b746c0 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c3fb8c r4:85c3f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3fb8c r4:85b32f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b32f80 r8:80287e08 r7:ed135e60 r6:85b68280 r5:85512400 r4:85b74500 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85513000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5e0c0 r5:85c5178c r4:85c51400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85513000 r8:85b6602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:6660 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:6660 tgid:6660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed155d84 r8:00000002 r7:60000113 r6:ed155d8c r5:85513c00 r4:85513c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85513c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed155e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b70280 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f193000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed18f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9538c r4:85b95000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9538c r4:85b66080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85513c00 r8:85b660ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66080 r8:80287e08 r7:ed0c5e60 r6:85b68380 r5:85513c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed155fb0 to 0xed155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b74500 INFO: task kworker/1:656:6660 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c13e1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b74dc0 r5:85b9478c r4:85b94400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c2c800 r8:85b6612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed179d84 r8:00000002 r7:60000013 r6:ed179d8c r5:85c2e000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b74ec0 r5:85b94b8c r4:85b94800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c19a6000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:6667 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:6667 tgid:6667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed17dd84 r8:00000002 r7:60000013 r6:ed17dd8c r5:85c29800 r4:85c29800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c29800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed17de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b70000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c29800 r7:00000000 r6:83018200 r5:00001000 r4:7f18f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed17f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b94f8c r4:85b94c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b94f8c r4:85b66300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c29800 r8:85b6632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66300 r8:80287e08 r7:ed155e60 r6:85b66380 r5:85c29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed17dfb0 to 0xed17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b74e40 INFO: task kworker/1:659:6667 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c1fd5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b9578c r4:85b95400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b89800 r8:85b6642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66400 r8:80287e08 r7:ed155e60 r6:85b66480 r5:85b89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed199fb0 to 0xed199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b70240 INFO: task kworker/1:660:6671 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c1fd5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b706c0 r5:85b95b8c r4:85b95800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b95b8c r4:85b66500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b8a400 r8:85b6652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85b8b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1ade08 r4:00000000 r5:85b95f8c r4:85b95c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:663 state:D stack:0 pid:6677 tgid:6677 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b70a80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9638c r4:85b96000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9638c r4:85b66700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b8bc00 r8:85b6672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66700 r8:80287e08 r7:ed1ade60 r6:85b66780 r5:85b8bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1b5fb0 to 0xed1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b708c0 INFO: task kworker/1:663:6677 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c25db000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:6679 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:6679 tgid:6679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1c1d84 r8:00000002 r7:60000113 r6:ed1c1d8c r5:85b8c800 r4:85b8c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b8c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b70c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f19d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b9678c r4:85b96400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85b8c800 r8:85b6682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c1fb0 to 0xed1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b70b00 INFO: task kworker/1:664:6679 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c2ae4000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:6681 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ed1c9d84 r8:00000002 r7:60000013 r6:ed1c9d8c r5:85b8d400 r4:00000000 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b96b8c r4:85b96800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b96b8c r4:85b66900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85b66900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66900 r8:80287e08 r7:ed1c1e60 r6:85b66980 r5:85b8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1c9fb0 to 0xed1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b70c40 INFO: task kworker/1:665:6681 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c307f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:6683 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7d040 r5:85b96f8c r4:85b96c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b96f8c r4:85b66a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b66a00 r8:80287e08 r7:ed1c9e60 r6:85b66a80 r5:85b8e000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85b8ec00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1a9000 r5:85b9778c r4:85b97400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9778c r4:85b66b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b8ec00 r8:85b66b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66b00 r8:80287e08 r7:ed1d5e60 r6:85b66b80 r5:85b8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1ddfb0 to 0xed1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b7d100 INFO: task kworker/1:667:6685 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c351c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:6689 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:6689 tgid:6689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed1f1d84 r8:00000002 r7:60000113 r6:ed1f1d8c r5:85b88000 r4:85b88000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85b88000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7d480 r5:85b9738c r4:85b97000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9738c r4:85b66c00 r10:61c88647 r9:85b88000 r8:85b66c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7d680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85b88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ab000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b97b8c r4:85b97800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b97b8c r4:85b66d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85b88c00 r8:85b66d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b66d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b66d00 r8:80287e08 r7:ed1dde60 r6:85b66d80 r5:85b88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed121fb0 to 0xed121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b7d580 INFO: task kworker/1:669:6691 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c38cf000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:6692 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:6692 tgid:6692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed161d84 r8:00000002 r7:60000013 r6:ed161d8c r5:85c2ec00 r4:85c2ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r4:00000000 r5:85b9c38c r4:85b9c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9c38c r4:85b66e00 r10:61c88647 r9:85c2ec00 r8:85b66e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed205000 r5:85b97f8c r4:85b97c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b66f00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c3e98000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:6698 blocked for more than 475 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:6698 tgid:6698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed211d84 r8:00000002 r7:60000013 r6:ed211d8c r5:85be1800 r4:85be1800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be1800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed211e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7db80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be1800 r7:00000000 r6:83018200 r5:00001000 r4:7f1b1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed219000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9c78c r4:85b9c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9c78c r4:85b6e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be1800 r8:85b6e02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e000 r8:80287e08 r7:ed161e60 r6:85b6e080 r5:85be1800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7de40 r5:85b9cb8c r4:85b9c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be2400 r8:85b6e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e100 r8:80287e08 r7:ed211e60 r6:85b6e180 r5:85be2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed225fb0 to 0xed225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b7dac0 INFO: task kworker/1:673:6699 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c440d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85be0c00 r4:8291a680 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b77040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec745000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9d38c r4:85b9d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9d38c r4:85b6e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be0c00 r8:85b6e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e200 r8:80287e08 r7:ed225e60 r6:85b6e280 r5:85be0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed229fb0 to 0xed229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b7dcc0 INFO: task kworker/1:674:6701 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:675 state:D stack:0 pid:6703 tgid:6703 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed22de08 r5:00001000 r4:ec553000 r5:85b9cf8c r4:85b9cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85514800 r8:85b6e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e300 r8:80287e08 r7:ed229e60 r6:85b68400 r5:85514800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed22dfb0 to 0xed22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77080 INFO: task kworker/1:675:6703 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c4cd6000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:676:6705 blocked for more than 476 seconds. r4:85516000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed21de08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b9d78c r4:85b9d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9d78c r4:85b6e380 r4:85b6e380 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 task:kworker/1:677 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec957000 r5:85b9db8c r4:85b9d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85516c00 r8:85b6e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85b77240 INFO: task kworker/1:677:6708 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c517d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:6710 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:6710 tgid:6710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed239d84 r8:00000002 r7:60000013 r6:ed239d8c r5:85515400 r4:85515400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85515400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed239e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b77580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f1b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b9df8c r4:85b9dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9df8c r4:85b6e480 r10:61c88647 r9:85515400 r8:85b6e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed23dd84 r8:00000002 r7:60000013 r6:ed23dd8c r5:85510000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85b9e38c r4:85b9e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85510000 r8:85b6e52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c575d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:6714 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:6714 tgid:6714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84841800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed241e08 r4:00000000 r5:85b9e78c r4:85b9e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9e78c r4:85b6e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84841800 r8:85b6e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e580 r8:80287e08 r7:ed23de60 r6:85b68680 r5:84841800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed241fb0 to 0xed241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77480 INFO: task kworker/1:680:6714 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c575d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:6717 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:6717 tgid:6717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed231d84 r8:00000002 r7:60000013 r6:ed231d8c r5:85be3c00 r4:85be3c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be3c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed231e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b77900 r5:85b9eb8c r4:85b9e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9eb8c r4:85b6e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be3c00 r8:85b6e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e600 r8:80287e08 r7:ed241e60 r6:85b6e680 r5:85be3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77480 INFO: task kworker/1:681:6717 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85be5400 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b77ac0 r5:85b9ef8c r4:85b9ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9ef8c r4:85b6e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b6e700 r8:80287e08 r7:ed231e60 r6:85b6e780 r5:85be5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77880 INFO: task kworker/1:682:6718 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c5f36000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:6720 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:6720 tgid:6720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed24dd84 r8:00000002 r7:60000013 r6:ed24dd8c r5:84846000 r4:84846000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84846000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed24de08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b77e40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f1c3000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9f78c r4:85b9f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9f78c r4:85b6e800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84846000 r8:85b6e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e800 r8:80287e08 r7:ed245e60 r6:85b68700 r5:84846000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed24dfb0 to 0xed24dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77a80 INFO: task kworker/1:683:6720 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c629f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85b9f38c r4:85b9f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9f38c r4:85b6e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed251fb0 to 0xed251ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:6724 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:6724 tgid:6724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed249d84 r8:00000002 r7:60000013 r6:ed249d8c r5:85be6c00 r4:85be6c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be6c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed249e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b7dc00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b9fb8c r4:85b9f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b9fb8c r4:85b6e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be6c00 r8:85b6e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6e900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6e900 r8:80287e08 r7:ed24de60 r6:85b6e980 r5:85be6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed249fb0 to 0xed249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77f00 INFO: task kworker/1:685:6724 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:686 state:D stack:0 pid:6726 tgid:6726 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85be4800 r7:00000000 r6:83018200 r5:00001000 r4:7f1cb000 r5:85ba838c r4:85ba8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba838c r4:85b6ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be4800 r8:85b6ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6ea00 r8:80287e08 r7:ed249e60 r6:85b6ea80 r5:85be4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed259fb0 to 0xed259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b77f40 INFO: task kworker/1:686:6726 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c6802000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:6728 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:6728 tgid:6728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed261d84 r8:00000002 r7:60000013 r6:ed261d8c r5:85be8000 r4:85be8000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be8000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed261e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b6f180 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be8000 r7:00000000 r6:83018200 r5:00001000 r4:7f1c9000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85b9ff8c r4:85b9fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85bea400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b6f500 r5:85ba878c r4:85ba8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c6e69000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:6733 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:6733 tgid:6733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed269d84 r8:00000002 r7:60000113 r6:ed269d8c r5:85beb000 r4:85beb000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85beb000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed269e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b6f740 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85beb000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba8b8c r4:85ba8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba8b8c r4:85b6ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85beb000 r8:85b6ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6ed00 r8:80287e08 r7:ed265e60 r6:85b6ed80 r5:85beb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed269fb0 to 0xed269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b6f4c0 INFO: task kworker/1:689:6733 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c7527000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:690:6735 blocked for more than 476 seconds. r4:85bebc00 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85ba8f8c r4:85ba8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba8f8c r4:85b6ee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bebc00 r8:85b6ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b6ee00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b6ee00 r8:80287e08 r7:ed269e60 r6:85b6ee80 r5:85bebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed26dfb0 to 0xed26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b6f700 INFO: task kworker/1:690:6735 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c7527000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85bec800 r7:00000000 r6:83018200 r5:00001000 r4:7f1d3000 r5:85c5338c r4:85c53000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c5338c r4:85b6ef00 r4:85b6ef00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:6739 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:692 state:D stack:0 pid:6739 tgid:6739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed25dd84 r8:00000002 r7:60000013 r6:ed25dd8c r5:85be8c00 r4:85be8c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be8c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b6fbc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1d5000 r5:85ba938c r4:85ba9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba938c r4:85b7c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed25dfb0 to 0xed25dff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:6741 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:6741 tgid:6741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed279d84 r8:00000002 r7:60000013 r6:ed279d8c r5:85bee000 r4:85bee000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85bee000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed279e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85bee000 r7:00000000 r6:83018200 r5:00001000 r4:7f1db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba9b8c r4:85ba9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba9b8c r4:85b7c100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85bee000 r8:85b7c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7c100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7c100 r8:80287e08 r7:ed25de60 r6:85b7c180 r5:85bee000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:85beec00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eceaf000 r5:85ba9f8c r4:85ba9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b7c280 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83100 INFO: task kworker/1:694:6745 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c8026000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 INFO: task kworker/1:695:6746 blocked for more than 476 seconds. r4:85bed400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed289e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85baa78c r4:85baa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85bed400 r8:85b7c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b83300 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:696 state:D stack:0 pid:6750 tgid:6750 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85be6000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be6000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed28de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be6000 r7:00000000 r6:83018200 r5:00001000 r4:7f1e1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85baa38c r4:85baa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85baa38c r4:85b7c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be6000 r8:85b7c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7c480 r8:80287e08 r7:ed289e60 r6:85b7c500 r5:85be6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed28dfb0 to 0xed28dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83540 INFO: task kworker/1:696:6750 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c8426000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:697:6752 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:697 state:D stack:0 pid:6752 tgid:6752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed255d84 r8:00000002 r7:60000113 r6:ed255d8c r5:85be3000 r4:85be3000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be3000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed255e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85be3000 r7:00000000 r6:83018200 r5:00001000 r4:7f1e5000 r5:85baab8c r4:85baa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85baab8c r4:85b7c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be3000 r8:85b7c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7c580 r8:80287e08 r7:ed289e60 r6:85b7c600 r5:85be3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed255fb0 to 0xed255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b837c0 INFO: task kworker/1:697:6752 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c8426000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:6755 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:6755 tgid:6755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed275d84 r8:00000002 r7:60000113 r6:ed275d8c r5:85be9800 r4:85be9800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85be9800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed275e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83e00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85be9800 r7:00000000 r6:83018200 r5:00001000 r4:7f1ed000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85babb8c r4:85bab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85babb8c r4:85b7c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85be9800 r8:85b7c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7c680 r8:80287e08 r7:ed255e60 r6:85b7c700 r5:85be9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed275fb0 to 0xed275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83780 INFO: task kworker/1:698:6755 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:84b40000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83900 r5:85baaf8c r4:85baac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b40000 r8:85b7c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83940 INFO: task kworker/1:699:6756 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c8894000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:6758 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:6758 tgid:6758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed299d84 r8:00000002 r7:60000013 r6:ed299d8c r5:84b40c00 r4:84b40c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bab38c r4:85bab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:6760 tgid:6760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed29dd84 r8:00000002 r7:60000013 r6:ed29dd8c r5:84b41800 r4:84b41800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b41800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed29de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b83c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b41800 r7:00000000 r6:83018200 r5:00001000 r4:7f1eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bab78c r4:85bab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bab78c r4:85b7c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b41800 r8:85b7c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7c980 r8:80287e08 r7:ed275e60 r6:85b7ca00 r5:84b41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed29dfb0 to 0xed29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83c40 INFO: task kworker/1:701:6760 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c8ce3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85bb038c r4:85bb0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b42400 r8:85b7caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:6764 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:6764 tgid:6764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2a1d84 r8:00000002 r7:60000013 r6:ed2a1d8c r5:84b43000 r4:84b43000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b43000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b6f700 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b43000 r7:00000000 r6:83018200 r5:00001000 r4:7f1ef000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed009000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85babf8c r4:85babc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85babf8c r4:85b7cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b43000 r8:85b7cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7cb80 r8:80287e08 r7:ed291e60 r6:85b7cc00 r5:84b43000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a1fb0 to 0xed2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b83f80 INFO: task kworker/1:703:6764 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:704:6766 blocked for more than 476 seconds. r5:84b43c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5f000 r5:85bb078c r4:85bb0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b7cc80 r8:80287e08 r7:ed291e60 r6:85b7cd00 r5:84b43c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:6769 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:6769 tgid:6769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2a9d84 r8:00000002 r7:60000013 r6:ed2a9d8c r5:84b44800 r4:84b44800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b44800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5f0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b44800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed025000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb0b8c r4:85bb0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb0b8c r4:85b7cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b44800 r8:85b7cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7cd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7cd80 r8:80287e08 r7:ed2a5e60 r6:85b7ce00 r5:84b44800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2a9fb0 to 0xed2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5f280 INFO: task kworker/1:705:6769 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c9757000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5f500 r5:85bb138c r4:85bb1000 r7:ddde2d80 r6:83018200 r5:85bb138c r4:85b7ce80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:6772 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:6772 tgid:6772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2add84 r8:00000002 r7:60000113 r6:ed2add8c r5:84b46000 r4:84b46000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b46000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5f300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b46000 r7:00000000 r6:83018200 r5:00001000 r4:7f1f7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb0f8c r4:85bb0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb0f8c r4:85b7cf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b46000 r8:85b7cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b7cf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b7cf80 r8:80287e08 r7:ed2b1e60 r6:85b7c200 r5:84b46000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2adfb0 to 0xed2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5f100 INFO: task kworker/1:707:6772 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: c9757000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b48000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5fb80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb1f8c r4:85bb1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b55000 r8:80287e08 r7:ed2b1e60 r6:85b55080 r5:84b48000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r5:800b0013 r4:80239bb0 r4:eaa3ddc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:6775 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:6775 tgid:6775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2c5d84 r8:00000002 r7:60000113 r6:ed2c5d8c r5:84b48c00 r4:84b48c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b48c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2c5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b5f840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1fb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb178c r4:85bb1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb178c r4:85b55100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b48c00 r8:85b5512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55100 r8:80287e08 r7:ed2c1e60 r6:85b55180 r5:84b48c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2c5fb0 to 0xed2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5f4c0 INFO: task kworker/1:709:6775 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ca29f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 task:kworker/1:710 state:D stack:0 pid:6778 tgid:6778 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb1b8c r4:85bb1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:6779 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:6779 tgid:6779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2b5d84 r8:00000002 r7:60000113 r6:ed2b5d8c r5:84b49800 r4:84b49800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b49800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b51000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b49800 r7:00000000 r6:83018200 r5:00001000 r4:7f203000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb278c r4:85bb2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb278c r4:85b55300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b49800 r8:85b5532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55300 r8:80287e08 r7:ed2c1e60 r6:85b55380 r5:84b49800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2b5fb0 to 0xed2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5fb40 INFO: task kworker/1:711:6779 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 task:kworker/1:712 state:D stack:0 pid:6781 tgid:6781 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2e1e08 r5:00001000 r4:ed2e3000 r5:85bb238c r4:85bb2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb238c r4:85b55400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4a400 r8:85b5542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55400 r8:80287e08 r7:ed2b5e60 r6:85b55480 r5:84b4a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed2e1fb0 to 0xed2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5fac0 INFO: task kworker/1:712:6781 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ca9fa000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:84b4bc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b511c0 r5:85bb2b8c r4:85bb2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb2b8c r4:85b55500 r10:61c88647 r9:84b4bc00 r8:85b5552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed2f1e08 r9:83018205 r8:84b4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f207000 r5:85bb2f8c r4:85bb2c00 r7:ddde2d80 r6:83018200 r5:85bb2f8c r4:85b55600 r10:00000000 r9:85b55600 r8:80287e08 r7:ed2dde60 r6:85b55680 r5:84b4d400 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b51180 INFO: task kworker/1:714:6786 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cb20f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:6789 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:6789 tgid:6789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed2fdd84 r8:00000002 r7:60000113 r6:ed2fdd8c r5:84b4e000 r4:84b4e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b4e000 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bb378c r4:85bb3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb378c r4:85b55700 r4:85b55700 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed307000 r5:85bb338c r4:85bb3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b55800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cb20f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:6792 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:6792 tgid:6792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed311d84 r8:00000002 r7:60000013 r6:ed311d8c r5:84b4c800 r4:84b4c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b4c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed311e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b51780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b4c800 r7:00000000 r6:83018200 r5:00001000 r4:7f20d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed31b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb3b8c r4:85bb3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb3b8c r4:85b55980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b4c800 r8:85b559ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55980 r8:80287e08 r7:ed2fde60 r6:85b55a00 r5:84b4c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed311fb0 to 0xed311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r5:800b0013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed319d84 r8:00000002 r7:60000113 r6:ed319d8c r5:84b46c00 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bb3f8c r4:85bb3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bb3f8c r4:85b55900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b46c00 r8:85b5592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55900 r8:80287e08 r7:ed311e60 r6:85b55a80 r5:84b46c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed319fb0 to 0xed319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b51740 INFO: task kworker/1:718:6794 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cba5e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:6796 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed325e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85bbc38c r4:85bbc000 r10:61c88647 r9:85c60000 r8:85b55b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: cbd1c000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:00000000 r5:00001000 r4:dfc17000 r5:85272f8c r4:85272c00 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:6798 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:6798 tgid:6798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed32dd84 r8:00000002 r7:60000013 r6:ed32dd8c r5:85c60c00 r4:85c60c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c60c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed32de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b51cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f213000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed335000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbc78c r4:85bbc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbc78c r4:85b55c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c60c00 r8:85b55c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55c00 r8:80287e08 r7:ed325e60 r6:85b55c80 r5:85c60c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed32dfb0 to 0xed32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b51c00 INFO: task kworker/1:720:6798 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cc122000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:6800 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:6800 tgid:6800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed341d84 r8:00000002 r7:60000113 r6:ed341d8c r5:85c62400 r4:85c62400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c62400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed341e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b63840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c62400 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed343000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c53f8c r4:85c53c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c53f8c r4:85b55d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c62400 r8:85b55d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55d00 r8:80287e08 r7:ed32de60 r6:85b55d80 r5:85c62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed341fb0 to 0xed341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b51c80 INFO: task kworker/1:721:6800 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cc122000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:722:6802 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:6802 tgid:6802 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85c61800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85bbcb8c r4:85bbc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbcb8c r4:85b55e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:6804 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:6804 tgid:6804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed355d84 r8:00000002 r7:60000013 r6:ed355d8c r5:84a78c00 r4:84a78c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a78c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed355e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f219000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed357000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbcf8c r4:85bbcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbcf8c r4:85b55f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a78c00 r8:85b55f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b55f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b55f00 r8:80287e08 r7:ed34de60 r6:85b68800 r5:84a78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed355fb0 to 0xed355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5fe40 INFO: task kworker/1:723:6804 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cc8b2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r5:800b0013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84a79800 r7:00000000 r6:83018200 r5:00001000 r4:7f21b000 r5:85bbd38c r4:85bbd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b55f80 r8:80287e08 r7:ed355e60 r6:85b68880 r5:84a79800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cc8b2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:6808 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:6808 tgid:6808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed339d84 r8:00000002 r7:60000013 r6:ed339d8c r5:84a7bc00 r4:84a7bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed339e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f21f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed36d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbd78c r4:85bbd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbd78c r4:85b47000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7bc00 r8:85b4702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85b47000 r8:80287e08 r7:ed361e60 r6:85b68900 r5:84a7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:6811 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:6811 tgid:6811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed379d84 r8:00000002 r7:60000113 r6:ed379d8c r5:84a7c800 r4:84a7c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed379e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f221000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed37b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbdb8c r4:85bbd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbdb8c r4:85b47080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7c800 r8:85b470ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47080 r8:80287e08 r7:ed339e60 r6:85b68980 r5:84a7c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed379fb0 to 0xed379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b433c0 INFO: task kworker/1:726:6811 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cd218000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:6813 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:6813 tgid:6813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed385d84 r8:00000002 r7:60000013 r6:ed385d8c r5:84a7d400 r4:84a7d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed385e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b437c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f225000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed38f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbe38c r4:85bbe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbe38c r4:85b47100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7d400 r8:85b4712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47100 r8:80287e08 r7:ed379e60 r6:85b68a00 r5:84a7d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed385fb0 to 0xed385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43540 INFO: task kworker/1:727:6813 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cd218000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:6816 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:6816 tgid:6816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed39dd84 r8:00000002 r7:60000113 r6:ed39dd8c r5:84a7b000 r4:84a7b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed39de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43640 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f223000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed381000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbdf8c r4:85bbdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbdf8c r4:85b47180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7b000 r8:85b471ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47180 r8:80287e08 r7:ed385e60 r6:85b68a80 r5:84a7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed39dfb0 to 0xed39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43680 INFO: task kworker/1:728:6816 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cd5f0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:6817 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:6817 tgid:6817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3a5d84 r8:00000002 r7:60000013 r6:ed3a5d8c r5:84a7a400 r4:84a7a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a7a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f227000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed395000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbe78c r4:85bbe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbe78c r4:85b47200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7a400 r8:85b4722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47200 r8:80287e08 r7:ed385e60 r6:85b68b00 r5:84a7a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3a5fb0 to 0xed3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43740 INFO: task kworker/1:729:6817 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cd5f0000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:6819 blocked for more than 476 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:6819 tgid:6819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3b5d84 r8:00000002 r7:60000013 r6:ed3b5d8c r5:85388c00 r4:85388c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85388c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b439c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85388c00 r7:00000000 r6:83018200 r5:00001000 r4:7f229000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbeb8c r4:85bbe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbeb8c r4:85b47280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85388c00 r8:85b472ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47280 r8:80287e08 r7:ed3a5e60 r6:85b68b80 r5:85388c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3b5fb0 to 0xed3b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b438c0 INFO: task kworker/1:730:6819 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cdc16000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:731:6821 blocked for more than 477 seconds. r4:85389800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3b9e08 r9:83018205 r8:85389800 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 r5:85bbf38c r4:85bbf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:731:6821 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cdd2e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:6822 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:732 state:D stack:0 pid:6822 tgid:6822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3c1d84 r8:00000002 r7:60000113 r6:ed3c1d8c r5:8538a400 r4:8538a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8538a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3c1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b43c00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8538a400 r7:00000000 r6:83018200 r5:00001000 r4:7f22b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbef8c r4:85bbec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbef8c r4:85b47380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8538a400 r8:85b473ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47380 r8:80287e08 r7:ed3b9e60 r6:85b68c80 r5:8538a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3c1fb0 to 0xed3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43d40 INFO: task kworker/1:732:6822 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cde4e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:733:6825 blocked for more than 477 seconds. [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:85bbf78c r4:85bbf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbf78c r4:85b47400 r10:61c88647 r9:8538b000 r8:85b4742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r5:00001000 r4:dfc17000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bbfb8c r4:85bbf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85bbfb8c r4:85b47480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8538bc00 r8:85b474ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47480 r8:80287e08 r7:ed3cde60 r6:85b68d80 r5:8538bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3ddfb0 to 0xed3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b5f980 INFO: task kworker/1:734:6827 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ce41a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:6828 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:6828 tgid:6828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3e1d84 r8:00000002 r7:60000113 r6:ed3e1d8c r5:8538c800 r4:8538c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3e1e08 r4:00000000 r9:83018205 r8:8538c800 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cb838c r4:85cb8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cb838c r4:85b47500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8538c800 r8:85b4752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47500 r8:80287e08 r7:ed3dde60 r6:85b68e00 r5:8538c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3e1fb0 to 0xed3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43ac0 INFO: task kworker/1:735:6828 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ce41a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3a9e08 r9:83018205 r8:8538d400 r7:00000000 r6:83018200 r5:00001000 r4:7f233000 r5:85bbff8c r4:85bbfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8538d400 r8:85b475ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ce7ab000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:6834 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:6834 tgid:6834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed039d84 r8:00000002 r7:60000113 r6:ed039d8c r5:8538e000 r4:8538e000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8538e000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed039e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3f300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8538e000 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 r5:85cb878c r4:85cb8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cb878c r4:85b47600 r10:61c88647 r9:8538e000 r8:85b4762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cb8b8c r4:85cb8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cb8b8c r4:85b47680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a7ec00 r8:85b476ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47680 r8:80287e08 r7:ed039e60 r6:85b68f80 r5:84a7ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed05dfb0 to 0xed05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3f340 INFO: task kworker/1:738:6837 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed061e08 r9:83018205 r8:84a7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f157000 r5:85cb938c r4:85cb9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b47700 r8:80287e08 r7:ed05de60 r6:85b36000 r5:84a7e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:6839 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:6839 tgid:6839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed071d84 r8:00000002 r7:60000013 r6:ed071d8c r5:8538ec00 r4:8538ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8538ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed071e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3f540 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8538ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed049000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cb8f8c r4:85cb8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cb8f8c r4:85b47780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8538ec00 r8:85b477ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47780 r8:80287e08 r7:ed061e60 r6:85b36080 r5:8538ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed071fb0 to 0xed071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3f700 INFO: task kworker/1:740:6839 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cef03000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed065000 r5:85cb978c r4:85cb9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:85518000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85518000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed091e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3fe40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518000 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed09b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cba78c r4:85cba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cba78c r4:85b47880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85518000 r8:85b478ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47880 r8:80287e08 r7:ed075e60 r6:85b36180 r5:85518000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3f840 INFO: task kworker/1:742:6844 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cf63c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:743:6846 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:85519800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed077000 r5:85cb9b8c r4:85cb9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cb9b8c r4:85b47900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85519800 r8:85b4792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47900 r8:80287e08 r7:ed091e60 r6:85b36200 r5:85519800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed101fb0 to 0xed101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3f9c0 INFO: task kworker/1:743:6846 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cf63c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed07f000 r5:85cb9f8c r4:85cb9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8551a400 r8:85b479ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47980 r8:80287e08 r7:ed091e60 r6:85b36280 r5:8551a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed115fb0 to 0xed115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3f9c0 INFO: task kworker/1:744:6847 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cf63c000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8551b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f1e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cba38c r4:85cba000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b47a00 r8:80287e08 r7:ed091e60 r6:85b36300 r5:8551b000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:746:6852 blocked for more than 477 seconds. r4:8551bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f5e08 r4:00000000 r5:85cbaf8c r4:85cbac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b47a80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:747:6853 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:747 state:D stack:0 pid:6853 tgid:6853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3f9d84 r8:00000002 r7:60000013 r6:ed3f9d8c r5:8551c800 r4:8551c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3ff40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8551c800 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbab8c r4:85cba800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbab8c r4:85b47b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551c800 r8:85b47b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47b00 r8:80287e08 r7:ed3f5e60 r6:85b36400 r5:8551c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed3f9fb0 to 0xed3f9ff8) r4:85b3f0c0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r4:00000000 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8551d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f5e08 r4:00000000 r5:85cbbf8c r4:85cbbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbbf8c r4:85b47b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8551d400 r8:85b47bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47b80 r8:80287e08 r7:ed3f5e60 r6:85b36480 r5:8551d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0f5fb0 to 0xed0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b43340 INFO: task kworker/1:748:6858 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cfefb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8551e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed04de08 r5:00001000 r4:ed0e9000 r5:85cbb38c r4:85cbb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbb38c r4:85b47c00 r10:61c88647 r9:8551e000 r8:85b47c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b42100 INFO: task kworker/1:749:6860 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: cfefb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:6862 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:6862 tgid:6862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed3fdd84 r8:00000002 r7:60000013 r6:ed3fdd8c r5:8551ec00 r4:8551ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8551ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed3fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f16d000 r5:85cbb78c r4:85cbb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbb78c r4:85b47c80 r10:61c88647 r9:8551ec00 r8:85b47cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85518c00 r4:8291a680 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed38de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42440 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f171000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed12b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbbb8c r4:85cbb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbbb8c r4:85b47d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85518c00 r8:85b47d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47d00 r8:80287e08 r7:ed0f5e60 r6:85b36600 r5:85518c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed38dfb0 to 0xed38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b420c0 INFO: task kworker/1:751:6863 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d02f6000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84b29800 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:ed145000 r5:85cbc38c r4:85cbc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b47d80 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:6869 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:6869 tgid:6869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed415d84 r8:00000002 r7:60000013 r6:ed415d8c r5:84b28c00 r4:84b28c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b28c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed415e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b427c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f177000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed14f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbc78c r4:85cbc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbc78c r4:85b47e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b28c00 r8:85b47e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47e00 r8:80287e08 r7:ed40de60 r6:85b36700 r5:84b28c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed415fb0 to 0xed415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b42600 INFO: task kworker/1:753:6869 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d0723000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ed419d84 r8:00000002 r7:60000113 r6:ed419d8c r5:84b2a400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85cbcf8c r4:85cbcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b2a400 r8:85b47eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:82ac21e4 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:6872 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:6872 tgid:6872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed401d84 r8:00000002 r7:60000013 r6:ed401d8c r5:85c63c00 r4:85c63c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c63c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed401e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42880 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f179000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed15b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbcb8c r4:85cbc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbcb8c r4:85b47f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c63c00 r8:85b47f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b47f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b47f00 r8:80287e08 r7:ed419e60 r6:85b47f80 r5:85c63c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed401fb0 to 0xed401ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:eaa3ddc0 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:756:6874 blocked for more than 477 seconds. r4:85c66000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed421e08 r4:00000000 r5:85cbd38c r4:85cbd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b31000 r8:80287e08 r7:ed419e60 r6:85b31080 r5:85c66000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:6877 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:6877 tgid:6877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed425d84 r8:00000002 r7:60000013 r6:ed425d8c r5:85c66c00 r4:85c66c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c66c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed425e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b42e80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f183000 r5:85cbdb8c r4:85cbd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbdb8c r4:85b31100 r10:00000000 r9:85b31100 r8:80287e08 r7:ed421e60 r6:85b31180 r5:85c66c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85c65400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85cbd78c r4:85cbd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b31200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d12b1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:6881 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:6881 tgid:6881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed42dd84 r8:00000002 r7:60000113 r6:ed42dd8c r5:85c64800 r4:85c64800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c64800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed42de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b3f0c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c64800 r7:00000000 r6:83018200 r5:00001000 r4:7f185000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbdf8c r4:85cbdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbdf8c r4:85b31300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c64800 r8:85b3132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31300 r8:80287e08 r7:ed425e60 r6:85b31380 r5:85c64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed42dfb0 to 0xed42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b3fec0 INFO: task kworker/1:759:6881 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d12b1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cbe38c r4:85cbe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c63000 r8:85b3142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:6885 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:6885 tgid:6885 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed405d84 r8:00000002 r7:60000013 r6:ed405d8c r5:85c68000 r4:85c68000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c68000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed405e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b26200 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c68000 r7:00000000 r6:83018200 r5:00001000 r4:7f18d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbe78c r4:85cbe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbe78c r4:85b31500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c68000 r8:85b3152c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31500 r8:80287e08 r7:ed435e60 r6:85b31580 r5:85c68000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed405fb0 to 0xed405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b26080 INFO: task kworker/1:761:6885 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d1750000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85c69800 r4:8291a680 r4:00000000 r4:00000000 r5:85cbeb8c r4:85cbe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbeb8c r4:85b31600 r10:61c88647 r9:85c69800 r8:85b3162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed439e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b266c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f193000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbef8c r4:85cbec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbef8c r4:85b31700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c6b000 r8:85b3172c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31700 r8:80287e08 r7:ed43de60 r6:85b31780 r5:85c6b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed439fb0 to 0xed439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b263c0 INFO: task kworker/1:763:6889 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d229b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85c68c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85cbf38c r4:85cbf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c68c00 r8:85b3182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85c6bc00 r4:00000000 r4:00000000 r5:85cbf78c r4:85cbf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c6bc00 r8:85b3192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31900 r8:80287e08 r7:ed445e60 r6:85b31980 r5:85c6bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed449fb0 to 0xed449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b263c0 INFO: task kworker/1:765:6893 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d2536000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:6895 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:766 state:D stack:0 pid:6895 tgid:6895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed451d84 r8:00000002 r7:60000013 r6:ed451d8c r5:85c6d400 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cbfb8c r4:85cbf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c6d400 r8:85b31a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfc17000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed221000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cbff8c r4:85cbfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cbff8c r4:85b31b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c6c800 r8:85b31b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31b00 r8:80287e08 r7:ed451e60 r6:85b31b80 r5:85c6c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed455fb0 to 0xed455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b26a00 INFO: task kworker/1:767:6898 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d2902000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:6900 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:6900 tgid:6900 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85cc838c r4:85cc8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b31c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85c70c00 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85cc8b8c r4:85cc8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cc8b8c r4:85b31d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c70c00 r8:85b31d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31d00 r8:80287e08 r7:ed45de60 r6:85b31d80 r5:85c70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed46dfb0 to 0xed46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b22000 INFO: task kworker/1:769:6902 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d2a61000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:6906 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed479d84 r8:00000002 r7:60000113 r6:ed479d8c r5:85c71800 r4:85c71800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c71800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed479e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b22600 r4:00000000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cc8f8c r4:85cc8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xeaa3dd28 to 0xeaa3dd70) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cc938c r4:85cc9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cc938c r4:85b31f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c72400 r8:85b31f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b31f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b31f00 r8:80287e08 r7:ed479e60 r6:85b31f80 r5:85c72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed441fb0 to 0xed441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b22640 INFO: task kworker/1:771:6908 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d2fab000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:772:6910 blocked for more than 477 seconds. r10:8291a684 r9:ed44dd84 r8:00000002 r7:60000113 r6:ed44dd8c r5:85c73000 r4:85c73000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c73000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed44de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b228c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c73000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cc978c r4:85cc9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cc978c r4:85b2b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c73000 r8:85b2b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2b000 r8:80287e08 r7:ed441e60 r6:85b2b080 r5:85c73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed44dfb0 to 0xed44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b22740 INFO: task kworker/1:772:6910 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cc9b8c r4:85cc9800 r10:61c88647 r9:85c73c00 r8:85b2b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:6914 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:6914 tgid:6914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85c75400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed495e08 r5:00001000 r4:ecaef000 r5:85cca78c r4:85cca400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cca78c r4:85b2b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c75400 r8:85b2b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2b200 r8:80287e08 r7:ed491e60 r6:85b2b280 r5:85c75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed495fb0 to 0xed495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b22a00 INFO: task kworker/1:774:6914 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d3489000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:6915 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r5:85c76000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed499e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b26dc0 r5:85cca38c r4:85cca000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cca38c r4:85b2b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c76000 r8:85b2b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85b2b300 r8:80287e08 r7:ed495e60 r6:85b2b380 r5:85c76000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d3709000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:776:6922 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:776 state:D stack:0 pid:6922 tgid:6922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4a5d84 r8:00000002 r7:60000113 r6:ed4a5d8c r5:85c76c00 r4:85c76c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c76c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b49140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ccab8c r4:85cca800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccab8c r4:85b2b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c76c00 r8:85b2b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2b400 r10:00000000 r9:85b2b400 r8:80287e08 r7:ed495e60 r6:85b2b480 r5:85c76c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:6923 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:6923 tgid:6923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed301d84 r8:00000002 r7:60000113 r6:ed301d8c r5:85c74800 r4:85c74800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c74800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed301e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b49300 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c74800 r7:00000000 r6:83018200 r5:00001000 r4:7f1b7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ccaf8c r4:85ccac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccaf8c r4:85b2b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c74800 r8:85b2b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2b500 r8:80287e08 r7:ed4a5e60 r6:85b2b580 r5:85c74800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed301fb0 to 0xed301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b49100 INFO: task kworker/1:777:6923 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d3b4d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:778:6925 blocked for more than 477 seconds. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85ccb38c r4:85ccb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c70000 r8:85b2b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d3fd7000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:6927 blocked for more than 477 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:6927 tgid:6927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4a9d84 r8:00000002 r7:60000113 r6:ed4a9d8c r5:85c6a400 r4:85c6a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c6a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b499c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1bf000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ccbf8c r4:85ccbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccbf8c r4:85b2b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed4a9fb0 to 0xed4a9ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85c6e000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4ade08 r5:85ccb78c r4:85ccb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccb78c r4:85b2b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c6e000 r8:85b2b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2b800 r8:80287e08 r7:ed4a9e60 r6:85b2b880 r5:85c6e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4adfb0 to 0xed4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b49480 INFO: task kworker/1:780:6928 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d4460000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:6931 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:85c78000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85c78000 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 r5:85ccbb8c r4:85ccb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ccbb8c r4:85b2b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85b2b900 r8:80287e08 r7:ed4a9e60 r6:85b2b980 r5:85c78000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:782:6933 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4b5d84 r8:00000002 r7:60000013 r6:ed4b5d8c r5:85c78c00 r4:85c78c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c78c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b49ac0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c78c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1c1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd438c r4:85cd4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd438c r4:85b2ba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c78c00 r8:85b2ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2ba00 r8:80287e08 r7:ed4a9e60 r6:85b2ba80 r5:85c78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4b5fb0 to 0xed4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b49980 INFO: task kworker/1:782:6933 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d4910000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ed4b9d84 r8:00000002 r7:60000113 r6:ed4b9d8c r5:85c79800 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85c79800 r7:00000000 r6:83018200 r5:00001000 r4:7f1c5000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd4b8c r4:85cd4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd4b8c r4:85b2bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c79800 r8:85b2bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2bb00 r8:80287e08 r7:ed4b5e60 r6:85b2bb80 r5:85c79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4b9fb0 to 0xed4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b49a40 INFO: task kworker/1:783:6935 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d4c92000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85243c40 r4:85c7a400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85cd478c r4:85cd4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b2bc00 r8:80287e08 r7:ed4b9e60 r6:85b2bc80 r5:85c7a400 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c1e08 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f1cb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd538c r4:85cd5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd538c r4:85b2bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c7b000 r8:85b2bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2bd00 r8:80287e08 r7:ed4b9e60 r6:85b2bd80 r5:85c7b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c1fb0 to 0xed4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b49cc0 INFO: task kworker/1:785:6939 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d4dc9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c5e08 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:eaa3ddc0 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ed4c9d84 r8:00000002 r7:60000113 r6:ed4c9d8c r5:85c7c800 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0b1c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1cd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd578c r4:85cd5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd578c r4:85b2bf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c7c800 r8:85b2bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b2bf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b2bf00 r8:80287e08 r7:ed4c1e60 r6:85b2bf80 r5:85c7c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4c9fb0 to 0xed4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0b000 INFO: task kworker/1:787:6943 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d5723000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85cd5b8c r4:85cd5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd5b8c r4:85b03000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed4d1d84 r8:00000002 r7:60000113 r6:ed4d1d8c r5:85c7e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0b780 r5:85cd678c r4:85cd6400 r7:ddde2d80 r6:83018200 r5:85cd678c r4:85b03100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:6950 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:6950 tgid:6950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4d5d84 r8:00000002 r7:60000113 r6:ed4d5d8c r5:85c7ec00 r4:85c7ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c7ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4d5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0b4c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85cd5f8c r4:85cd5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85b03200 r4:85b0b5c0 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85c80000 r7:00000000 r6:83018200 r5:00001000 r4:7f1d3000 r5:85cd638c r4:85cd6000 r10:61c88647 r9:85c80000 r8:85b0332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0b5c0 INFO: task kworker/1:791:6951 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d597f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:6953 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:6953 tgid:6953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4ddd84 r8:00000002 r7:60000113 r6:ed4ddd8c r5:85c80c00 r4:85c80c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c80c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4dde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0b900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1db000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed00d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd6b8c r4:85cd6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd6b8c r4:85b03400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c80c00 r8:85b0342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03400 r8:80287e08 r7:ed4d1e60 r6:85b03480 r5:85c80c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4ddfb0 to 0xed4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: d5f2d000 eab8d000 00000001 80239b98 7f2c7000 00000001 r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:6955 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:793 state:D stack:0 pid:6955 tgid:6955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4e5d84 r8:00000002 r7:60000013 r6:ed4e5d8c r5:84b2e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84b2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f1e1000 r5:85cd738c r4:85cd7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd738c r4:85b03500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2e000 r8:85b0352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800b0013 r4:80239bb0 r4:82ac21e4 r4:eaa3ddc0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc6-syzkaller #0 task:kworker/1:794 state:D stack:0 pid:6956 tgid:6956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4e9d84 r8:00000002 r7:60000013 r6:ed4e9d8c r5:84b2b000 r4:84b2b000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2b000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4e9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0bb40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f1dd000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed019000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd6f8c r4:85cd6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd6f8c r4:85b03580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2b000 r8:85b035ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03580 r8:80287e08 r7:ed4e5e60 r6:85b36880 r5:84b2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4e9fb0 to 0xed4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0b6c0 INFO: task kworker/1:794:6956 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d6404000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:6959 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:6959 tgid:6959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4edd84 r8:00000002 r7:60000113 r6:ed4edd8c r5:84b2ec00 r4:84b2ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4ede08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b0be40 r9:83018205 r8:84b2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f1e5000 r5:85cd778c r4:85cd7400 r10:61c88647 r9:84b2ec00 r8:85b0362c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85249580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018205 r8:84b28000 r7:00000000 r6:83018200 r5:00001000 r4:7f1eb000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdc38c r4:85cdc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdc38c r4:85b03680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b28000 r8:85b036ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03680 r8:80287e08 r7:ed4ede60 r6:85b36980 r5:84b28000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4f5fb0 to 0xed4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b22400 INFO: task kworker/1:796:6962 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d680f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:6963 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:6963 tgid:6963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4f9d84 r8:00000002 r7:60000013 r6:ed4f9d8c r5:84b2c800 r4:84b2c800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2c800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4f9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b22b40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1e7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cd7b8c r4:85cd7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cd7b8c r4:85b03700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2c800 r8:85b0372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Workqueue: events bpf_prog_free_deferred dd20: d680f000 eab8d000 00000001 80239b98 7f2c7000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b2d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed501e08 r9:83018205 r8:84b2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1e9000 r5:85cd7f8c r4:85cd7c00 r7:ddde2d80 r6:83018200 r5:85cd7f8c r4:85b03780 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af7080 INFO: task kworker/1:798:6966 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d6eb2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:6969 blocked for more than 478 seconds. r10:8291a684 r9:ed50dd84 r8:00000002 r7:60000013 r6:ed50dd8c r5:85531800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af7880 r5:85cdd78c r4:85cdd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdd78c r4:85b03800 r10:61c88647 r9:85531800 r8:85b0382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85af7180 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d6eb2000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed309000 r5:85cdc78c r4:85cdc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdc78c r4:85b03880 r10:61c88647 r9:85532400 r8:85b038ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: d7075000 eab8d000 00000001 80239b98 7f2c7000 00000001 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/1:801:6972 blocked for more than 478 seconds. r4:85530c00 r4:00000000 r4:00000000 r5:85cdcb8c r4:85cdc800 r7:ddde2d80 r6:83018200 r5:85cdcb8c r4:85b03900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r4:85249580 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:802 state:D stack:0 pid:6973 tgid:6973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed4f1d84 r8:00000002 r7:60000113 r6:ed4f1d8c r5:85c83000 r4:85c83000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c83000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4f1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af7500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c83000 r7:00000000 r6:83018200 r5:00001000 r4:7f1f1000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed327000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdcf8c r4:85cdcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdcf8c r4:85b03980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c83000 r8:85b039ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03980 r8:80287e08 r7:ed50de60 r6:85b03a00 r5:85c83000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed4f1fb0 to 0xed4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af7380 INFO: task kworker/1:802:6973 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d7302000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdd38c r4:85cdd000 r10:61c88647 r9:85c83c00 r8:85b03aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85af7800 Workqueue: events bpf_prog_free_deferred dd20: d7302000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c84800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f7000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed351000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cddb8c r4:85cdd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cddb8c r4:85b03b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c84800 r8:85b03bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03b80 r8:80287e08 r7:ed50de60 r6:85b03c00 r5:85c84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed521fb0 to 0xed521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af7680 INFO: task kworker/1:804:6978 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d797e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:6979 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:6979 tgid:6979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed525d84 r8:00000002 r7:60000013 r6:ed525d8c r5:85c85400 r4:85c85400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c85400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed525e08 r4:00000000 r5:85cddf8c r4:85cddc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85b03c80 r8:80287e08 r7:ed521e60 r6:85b03d00 r5:85c85400 r4:85af7b00 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:6982 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:6982 tgid:6982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed529d84 r8:00000002 r7:60000013 r6:ed529d8c r5:85c86000 r4:85c86000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c86000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed529e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85cde78c r4:85cde400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cde78c r4:85b03d80 r4:85b03d80 Exception stack(0xed529fb0 to 0xed529ff8) task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d7fe5000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 INFO: task kworker/1:807:6984 blocked for more than 478 seconds. r4:85c86c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed4e1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85cde38c r4:85cde000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85c86c00 r8:85b03eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85530000 r7:00000000 r6:83018200 r5:00001000 r4:7f1ff000 r5:85cdeb8c r4:85cde800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdeb8c r4:85b03f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85530000 r8:85b03fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85b03f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b03f80 r8:80287e08 r7:ed529e60 r6:85b36c80 r5:85530000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed539fb0 to 0xed539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85af7d40 INFO: task kworker/1:808:6986 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d8345000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed531d84 r8:00000002 r7:60000113 r6:ed531d8c r5:85533000 r4:85533000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85533000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed531e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b220c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533000 r7:00000000 r6:83018200 r5:00001000 r4:7f203000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdf38c r4:85cdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdf38c r4:85aa0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85533000 r8:85aa002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0000 r8:80287e08 r7:ed539e60 r6:85b36d00 r5:85533000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed531fb0 to 0xed531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b0bf40 INFO: task kworker/1:809:6988 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ed53dd84 r8:00000002 r7:60000013 r6:ed53dd8c r5:85534800 r4:00000000 r4:00000000 r5:85cdf78c r4:85cdf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85aa0080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:eaa3ddc0 r5:00001000 r4:dfc17000 r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:6993 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:6993 tgid:6993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed541d84 r8:00000002 r7:60000113 r6:ed541d8c r5:85535400 r4:85535400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85535400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed541e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c400 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85535400 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdfb8c r4:85cdf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdfb8c r4:85aa0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85535400 r8:85aa012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a9c100 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:6999 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:6999 tgid:6999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed52dd84 r8:00000002 r7:60000013 r6:ed52dd8c r5:85533c00 r4:85533c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85533c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed52de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c580 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85533c00 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed03d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cdff8c r4:85cdfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cdff8c r4:85aa0180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85533c00 r8:85aa01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0180 r8:80287e08 r7:ed541e60 r6:85b36e80 r5:85533c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed52dfb0 to 0xed52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c540 INFO: task kworker/1:812:6999 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d8b40000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:7000 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:7000 tgid:7000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed48dd84 r8:00000002 r7:60000113 r6:ed48dd8c r5:85536000 r4:85536000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85536000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed48de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85536000 r7:00000000 r6:83018200 r5:00001000 r4:7f153000 r5:85ce438c r4:85ce4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce438c r4:85aa0200 r10:00000000 r9:85aa0200 r8:80287e08 r7:ed52de60 r6:85b36f00 r5:85536000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed0bf000 r5:85ce578c r4:85ce5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a9c7c0 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:7005 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:7005 tgid:7005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed55dd84 r8:00000002 r7:60000113 r6:ed55dd8c r5:84b3a400 r4:84b3a400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3a400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed55de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a9c840 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b3a400 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed063000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ce478c r4:85ce4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce478c r4:85aa0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3a400 r8:85aa032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0300 r8:80287e08 r7:ed555e60 r6:85a92000 r5:84b3a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ce4b8c r4:85ce4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce4b8c r4:85aa0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b38000 r8:85aa03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0380 r8:80287e08 r7:ed555e60 r6:85a92080 r5:84b38000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed565fb0 to 0xed565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c800 INFO: task kworker/1:816:7007 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: d97a1000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:817:7009 blocked for more than 478 seconds. r5:84b39800 r4:8291a680 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ce4f8c r4:85ce4c00 r10:61c88647 r9:84b39800 r8:85aa042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0400 r8:80287e08 r7:ed555e60 r6:85a92100 r5:84b39800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed56dfb0 to 0xed56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9c8c0 INFO: task kworker/1:817:7009 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85ce538c r4:85ce5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b3b000 r8:85aa04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:7012 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:7012 tgid:7012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed579d84 r8:00000002 r7:60000113 r6:ed579d8c r5:84b3bc00 r4:84b3bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed579e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8488dd40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b3bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed109000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ce638c r4:85ce6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce638c r4:85aa0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3bc00 r8:85aa052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0500 r8:80287e08 r7:ed555e60 r6:85a92200 r5:84b3bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed579fb0 to 0xed579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9cb80 INFO: task kworker/1:819:7012 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 task:kworker/1:820 state:D stack:0 pid:7014 tgid:7014 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85ce5b8c r4:85ce5800 r10:61c88647 r9:85cf8c00 r8:85aa05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0580 r8:80287e08 r7:ed579e60 r6:85aa0600 r5:85cf8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed535fb0 to 0xed535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a9ccc0 INFO: task kworker/1:820:7014 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: da372000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85cf9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed581e08 r9:83018205 r8:85cf9800 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 r5:85ce5f8c r4:85ce5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:7019 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85cfa400 r7:00000000 r6:83018200 r5:00001000 r4:7f16b000 r5:85ce6b8c r4:85ce6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85aae280 INFO: task kworker/1:822:7019 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: daade000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed129000 r5:85ce678c r4:85ce6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce678c r4:85aa0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dd20: daade000 eab8d000 00000001 80239b98 7f2c7000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85ce6f8c r4:85aa0980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:00000000 r5:85272f8c r4:85272c00 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:7025 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:7025 tgid:7025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed591d84 r8:00000002 r7:60000113 r6:ed591d8c r5:85cfc800 r4:85cfc800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cfc800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed591e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80380 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85cfc800 r7:00000000 r6:83018200 r5:00001000 r4:7f171000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed163000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ce738c r4:85ce7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce738c r4:85aa0a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cfc800 r8:85aa0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0a80 r8:80287e08 r7:ed58de60 r6:85aa0b00 r5:85cfc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed591fb0 to 0xed591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a80100 INFO: task kworker/1:825:7025 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: db37a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:7027 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85cfd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed595e08 r9:83018205 r8:85cfd400 r7:00000000 r6:83018200 r5:00001000 r4:7f173000 r5:85ce778c r4:85ce7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce778c r4:85aa0b80 r10:61c88647 r9:85cfd400 r8:85aa0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:7029 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:7029 tgid:7029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed599d84 r8:00000002 r7:60000013 r6:ed599d8c r5:85cfe000 r4:85cfe000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85cfe000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed599e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a807c0 r5:85ce7f8c r4:85ce7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce7f8c r4:85aa0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85aa0c80 r8:80287e08 r7:ed595e60 r6:85aa0d00 r5:85cfe000 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85cfec00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85ce7b8c r4:85ce7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ce7b8c r4:85aa0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85cfec00 r8:85aa0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0d80 r8:80287e08 r7:ed599e60 r6:85aa0e00 r5:85cfec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed549fb0 to 0xed549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a804c0 INFO: task kworker/1:828:7030 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dbbc9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:7033 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85c82400 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed1f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cecb8c r4:85cec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cecb8c r4:85aa0e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c82400 r8:85aa0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0e80 r8:80287e08 r7:ed599e60 r6:85aa0f00 r5:85c82400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a1fb0 to 0xed5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a806c0 INFO: task kworker/1:829:7033 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dbbc9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:7034 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:7034 tgid:7034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5a5d84 r8:00000002 r7:60000113 r6:ed5a5d8c r5:85c81800 r4:85c81800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85c81800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80d80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85c81800 r7:00000000 r6:83018200 r5:00001000 r4:7f17d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cec78c r4:85cec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cec78c r4:85aa0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85c81800 r8:85aa0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa0f80 r8:80287e08 r7:ed5a1e60 r6:85a72000 r5:85c81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a5fb0 to 0xed5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a80b00 INFO: task kworker/1:830:7034 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dbf6a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:7039 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:7039 tgid:7039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5add84 r8:00000002 r7:60000113 r6:ed5add8c r5:85d00c00 r4:85d00c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d00c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5ade08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a80f80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f183000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85cecf8c r4:85cecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cecf8c r4:85a72080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85a72080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dbf6a000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:7041 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:7041 tgid:7041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed59dd84 r8:00000002 r7:60000013 r6:ed59dd8c r5:85d01800 r4:85d01800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d01800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed59de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76040 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d01800 r7:00000000 r6:83018200 r5:00001000 r4:7f185000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed21f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ced38c r4:85ced000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ced38c r4:85a72180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d01800 r8:85a721ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72180 r8:80287e08 r7:ed5ade60 r6:85a72200 r5:85d01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed59dfb0 to 0xed59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76000 INFO: task kworker/1:832:7041 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:833:7043 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:833 state:D stack:0 pid:7043 tgid:7043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5a9d84 r8:00000002 r7:60000013 r6:ed5a9d8c r5:85d02400 r4:85d02400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d02400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5a9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a761c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d02400 r7:00000000 r6:83018200 r5:00001000 r4:7f18b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ced78c r4:85ced400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ced78c r4:85a72280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d02400 r8:85a722ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72280 r8:80287e08 r7:ed59de60 r6:85a72300 r5:85d02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5a9fb0 to 0xed5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76300 INFO: task kworker/1:833:7043 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dc8ab000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:7045 blocked for more than 478 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:7045 tgid:7045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5b1d84 r8:00000002 r7:60000113 r6:ed5b1d8c r5:85d03000 r4:85d03000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d03000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76340 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d03000 r7:00000000 r6:83018200 r5:00001000 r4:7f18d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed40f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cedb8c r4:85ced800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cedb8c r4:85a72380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d03000 r8:85a723ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72380 r8:80287e08 r7:ed5a9e60 r6:85a72400 r5:85d03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b1fb0 to 0xed5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76480 INFO: task kworker/1:834:7045 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dc8ab000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:7047 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:7047 tgid:7047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5b9d84 r8:00000002 r7:60000113 r6:ed5b9d8c r5:85d04800 r4:85d04800 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d04800 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76680 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d04800 r7:00000000 r6:83018200 r5:00001000 r4:7f18f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed41d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cedf8c r4:85cedc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cedf8c r4:85a72480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d04800 r8:85a724ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72480 r8:80287e08 r7:ed5b1e60 r6:85a72500 r5:85d04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b9fb0 to 0xed5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76280 INFO: task kworker/1:835:7047 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dccac000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r4:85249580 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:85243c40 Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:7049 tgid:7049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5b5d84 r8:00000002 r7:60000113 r6:ed5b5d8c r5:85d05400 r4:85d05400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d05400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76780 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d05400 r7:00000000 r6:83018200 r5:00001000 r4:7f193000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed457000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cee38c r4:85cee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cee38c r4:85a72580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d05400 r8:85a725ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72580 r8:80287e08 r7:ed5b9e60 r6:85a72600 r5:85d05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b5fb0 to 0xed5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76640 INFO: task kworker/1:836:7049 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dccac000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85a72680 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 r5:85d03c00 r4:8291a680 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:7055 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:7055 tgid:7055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5c9d84 r8:00000002 r7:60000013 r6:ed5c9d8c r5:85d00000 r4:85d00000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d00000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c9e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a76d00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d00000 r7:00000000 r6:83018200 r5:00001000 r4:7f19b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed483000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ceef8c r4:85ceec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ceef8c r4:85a72880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d00000 r8:85a728ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72880 r8:80287e08 r7:ed5bde60 r6:85a72900 r5:85d00000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5c9fb0 to 0xed5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76980 INFO: task kworker/1:839:7055 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dd97d000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Workqueue: events bpf_prog_free_deferred [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:00001000 r4:dfc17000 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:7058 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:7058 tgid:7058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed5d1d84 r8:00000002 r7:60000013 r6:ed5d1d8c r5:85d08000 r4:85d08000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d08000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5d1e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af7d40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d08000 r7:00000000 r6:83018200 r5:00001000 r4:7f19d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cef38c r4:85cef000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85cef38c r4:85a72a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d08000 r8:85a72aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72a80 r8:80287e08 r7:ed5cde60 r6:85a72b00 r5:85d08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5d1fb0 to 0xed5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a76cc0 task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b27b8c r4:84b27800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b27b8c r4:85a72b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d08c00 r8:85a72bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72b80 r8:80287e08 r7:ed5cde60 r6:85a72c00 r5:85d08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5e1fb0 to 0xed5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a80cc0 INFO: task kworker/1:842:7061 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:843 state:D stack:0 pid:7063 tgid:7063 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85cefb8c r4:85cef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85a67000 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ed5f5d84 r8:00000002 r7:60000113 r6:ed5f5d8c r5:85d0bc00 r4:85d0bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d0bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5f5e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849122c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f23f000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed729000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6c38c r4:84a6c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6c38c r4:85a72d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d0bc00 r8:85a72dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72d80 r8:80287e08 r7:ed5ede60 r6:85a72e00 r5:85d0bc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:7068 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:7068 tgid:7068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5c5e08 r5:00001000 r4:ed5fd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ceff8c r4:85cefc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85d0e000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed615e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912140 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f229000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa6b8c r4:84aa6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa6b8c r4:85a72f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d0e000 r8:85a72fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a72f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a72f80 r8:80287e08 r7:ed5f5e60 r6:85a6f000 r5:85d0e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed615fb0 to 0xed615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a678c0 INFO: task kworker/1:846:7073 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: ded5b000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:7163 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:7163 tgid:7163 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ed685d84 r8:00000002 r7:60000113 r6:ed685d8c r5:85d09800 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6c78c r4:84a6c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6d38c r4:84a6d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: df8a3000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85243c40 task:kworker/1:849 state:D stack:0 pid:7171 tgid:7171 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed715e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6cb8c r4:84a6c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:7177 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:7177 tgid:7177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed745d84 r8:00000002 r7:60000113 r6:ed745d8c r5:85d0d400 r4:85d0d400 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d0d400 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed745e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912a40 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f24d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed75f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6d78c r4:84a6d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6d78c r4:85a6f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d0d400 r8:85a6f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6f380 r8:80287e08 r7:ed505e60 r6:85a6f400 r5:85d0d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed745fb0 to 0xed745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912880 INFO: task kworker/1:850:7177 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: dfa9e000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:851:7180 blocked for more than 479 seconds. r5:85cf8000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd64c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:7181 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:7181 tgid:7181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed76dd84 r8:00000002 r7:60000113 r6:ed76dd8c r5:85d18000 r4:85d18000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d18000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed76de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84912cc0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d18000 r7:00000000 r6:83018200 r5:00001000 r4:7f251000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed773000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84a6db8c r4:84a6d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a6db8c r4:85a6f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d18000 r8:85a6f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6f580 r8:80287e08 r7:ed73de60 r6:85a6f600 r5:85d18000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed76dfb0 to 0xed76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84912980 INFO: task kworker/1:852:7181 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e0018000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 INFO: task kworker/1:853:7231 blocked for more than 479 seconds. r4:85d1d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7c1e08 r5:00001000 r4:ed84b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d9f78c r4:85d9f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d9f78c r4:85a6f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d1d400 r8:85a6f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6f680 r8:80287e08 r7:ed73de60 r6:85a6f700 r5:85d1d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7c1fb0 to 0xed7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85b28980 INFO: task kworker/1:853:7231 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e046f000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:7322 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:7322 tgid:7322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed8e9d84 r8:00000002 r7:60000013 r6:ed8e9d8c r5:85d1bc00 r4:85d1bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d1bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aad78c r4:84aad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xed8e9fb0 to 0xed8e9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:7323 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:7323 tgid:7323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed769d84 r8:00000002 r7:60000113 r6:ed769d8c r5:85d1ec00 r4:85d1ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d1ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed769e08 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aadb8c r4:84aad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 dd60: 80230ad0 80239bb0 800b0013 ffffffff r4:eaa3ddc0 r5:00001000 r4:dfc17000 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd6900 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f351000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed601000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aacf8c r4:84aacc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aacf8c r4:85a6f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d1c800 r8:85a6f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6f980 r8:80287e08 r7:ed8e9e60 r6:85a6fa00 r5:85d1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8f1fb0 to 0xed8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85dd6a40 INFO: task kworker/1:856:7325 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e09e3000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85243c40 Workqueue: events bpf_prog_free_deferred [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aacb8c r4:84aac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aacb8c r4:85a6fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d1b000 r8:85a6faac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6fa80 r8:80287e08 r7:ed8f1e60 r6:85a6fb00 r5:85d1b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed8f5fb0 to 0xed8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85dd6a40 INFO: task kworker/1:857:7326 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e0f72000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 INFO: task kworker/1:858:7329 blocked for more than 479 seconds. r4:85d19800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8ede08 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed8edfb0 to 0xed8edff8) Workqueue: events bpf_prog_free_deferred dd20: e125f000 eab8d000 00000001 80239b98 7f2c7000 00000001 r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:7331 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:7331 tgid:7331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed8fdd84 r8:00000002 r7:60000113 r6:ed8fdd8c r5:85d18c00 r4:85d18c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d18c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8fde08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd6f00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f357000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aac38c r4:84aac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r5:85272f8c r4:85272c00 r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) INFO: task kworker/1:860:7334 blocked for more than 479 seconds. r4:85d1a400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dd68c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85dd6ec0 r4:00000000 dd60: 80230ad0 80239bb0 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed905e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916000 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85d1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f35b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aa7b8c r4:84aa7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84aa7b8c r4:85a6fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85d1e000 r8:85a6feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a6fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a6fe80 r8:80287e08 r7:ed901e60 r6:85a6ff00 r5:85d1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed905fb0 to 0xed905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849160c0 INFO: task kworker/1:861:7335 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e19b9000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:7337 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:7337 tgid:7337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed909d84 r8:00000002 r7:60000113 r6:ed909d8c r5:85d20000 r4:85d20000 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85d20000 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed909e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849161c0 r5:00001000 r4:ed721000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85d20000 r8:85a6ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 Exception stack(0xeaa3dfb0 to 0xeaa3dff8) Not tainted 6.15.0-rc6-syzkaller #0 r4:85d20c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed90de08 r5:00001000 r4:ed72f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85d20c00 r8:84b560ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916180 INFO: task kworker/1:863:7339 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e2166000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:864:7341 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:864 state:D stack:0 pid:7341 tgid:7341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed919d84 r8:00000002 r7:60000113 r6:ed919d8c r5:84b3ec00 r4:84b3ec00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b3ec00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed919e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916500 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6c38c r4:85d6c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6c38c r4:84b56180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84916340 r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r5:800b0013 r4:80239bb0 r4:eaa3ddc0 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:865:7343 blocked for more than 479 seconds. r10:8291a684 r9:ed921d84 r8:00000002 r7:60000113 r6:ed921d8c r5:84b3d400 [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849168c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f367000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed775000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6cf8c r4:85d6cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6cf8c r4:84b56200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3d400 r8:84b5622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b56200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56200 r8:80287e08 r7:ed919e60 r6:85a92300 r5:84b3d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed921fb0 to 0xed921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916440 INFO: task kworker/1:865:7343 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e2861000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a92400 r8:852495ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85249580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:7345 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:7345 tgid:7345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed929d84 r8:00000002 r7:60000013 r6:ed929d8c r5:84b2bc00 r4:84b2bc00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b2bc00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed929e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916600 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed751000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6c78c r4:85d6c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6c78c r4:84b56280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b2bc00 r8:84b562ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84b56280 r8:80287e08 r7:ed921e60 r6:85a92380 r5:84b2bc00 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc6-syzkaller #0 r4:84b3e000 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed92de08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849167c0 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f365000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed75d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6cb8c r4:85d6c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6cb8c r4:84b56300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b3e000 r8:84b5632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b56300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56300 r8:80287e08 r7:ed921e60 r6:85a92400 r5:84b3e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed92dfb0 to 0xed92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916580 INFO: task kworker/1:867:7346 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e2d01000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:85249580 r10:00000000 r9:85249580 r8:80287e08 r7:eab89e60 r6:85249600 r5:84a92400 r4:85243c40 task:kworker/1:868 state:D stack:0 pid:7348 tgid:7348 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857d0000 r8:84b563ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85243c40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:869:7353 blocked for more than 479 seconds. Not tainted 6.15.0-rc6-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:869 state:D stack:0 pid:7353 tgid:7353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a540c8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53144>] (__schedule) from [<81a540c8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ed911d84 r8:00000002 r7:60000013 r6:ed911d8c r5:857d0c00 r4:857d0c00 [<81a5409c>] (schedule) from [<81a544b0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d0c00 r4:8291a680 [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54498>] (schedule_preempt_disabled) from [<81a56b94>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56894>] (__mutex_lock.constprop.0) from [<81a57060>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed911e08 r4:00000000 [<81a5704c>] (__mutex_lock_slowpath) from [<81a570a0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57064>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916b00 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f36d000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6d38c r4:85d6d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6d38c r4:84b56400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d0c00 r8:84b5642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b56400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b56400 r8:80287e08 r7:ed935e60 r6:85a92500 r5:857d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed911fb0 to 0xed911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84916a40 INFO: task kworker/1:869:7353 is blocked on a mutex likely owned by task kworker/0:297:4186. task:kworker/0:297 state:R running task stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53144>] (__schedule) from [<81a544fc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a92400 r8:80200be4 r7:eaa3dd5c r6:ffffffff r5:84a92400 r4:00000000 [<81a544bc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xeaa3dd28 to 0xeaa3dd70) dd20: e2fbb000 eab8d000 00000001 80239b98 7f2c7000 00000001 dd40: 82ac15a0 7f2c7000 eab8d000 8280c928 82ac21c4 eaa3dda4 eaa3dda8 eaa3dd78 dd60: 80230ad0 80239bb0 800b0013 ffffffff r5:800b0013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:eaa3ddc0 r5:eaa3de08 r4:eaa3ddc0 [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85243c80 r4:00000000 [<804eb568>] (vfree) from [<8054b11c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0ec>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00