Extracting prog: 11m18.777146323s Minimizing prog: 1h16m10.758483862s Simplifying prog options: 0s Extracting C: 8m41.988475981s Simplifying C: 58m43.206661206s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000200000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h34m54.730794712s repro crashed as (corrupted=false): INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533c780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d5ab8c r4:85d5a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d5ab8c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8700 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d227d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:1:86 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:86 tgid:86 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000013 r6:df9c1d8c r5:838bd400 r4:838bd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541aa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8544cb8c r4:8544c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8544cb8c r4:8329e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:838bd400 r8:8329e22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8329e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8329e200 r8:80287e08 r7:df879e60 r6:8390c580 r5:838bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8329a500 INFO: task kworker/1:1:86 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2cf2000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/1:2:721 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:721 tgid:721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e012dd84 r8:00000002 r7:60000113 r6:e012dd8c r5:83b00c00 r4:83b00c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b00c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e012de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8512c5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85180b8c r4:85180800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85180b8c r4:83bfd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b00c00 r8:83bfd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83bfd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bfd680 r8:80287e08 r7:df879e60 r6:83acab80 r5:83b00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe012dfb0 to 0xe012dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83bfe640 INFO: task kworker/1:2:721 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2cf2000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:7:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:8412a400 r4:8412a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8412a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8412a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472bb8c r4:8472b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8472bb8c r4:84a06880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412a400 r8:84a068ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06880 r8:80287e08 r7:df995e60 r6:849a1500 r5:8412a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f20c0 INFO: task kworker/0:7:3119 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d2f62000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:8:3121 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83243c00 r4:83243c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85086a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af538c r4:84af5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af538c r4:84a06980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:84a069ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06980 r8:80287e08 r7:df9e1e60 r6:849a1980 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:8:3121 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d328b000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:9:3122 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:83242400 r4:83242400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848489c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83242400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8501478c r4:85014400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8501478c r4:84a06a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:84a06a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06a00 r8:80287e08 r7:df9ede60 r6:849a1600 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:9:3122 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d32f5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:10:3123 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:84138000 r4:84138000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84138000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850866c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84138000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af578c r4:84af5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af578c r4:84a06800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84138000 r8:84a0682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06800 r8:80287e08 r7:df9ede60 r6:84a06b00 r5:84138000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2280 INFO: task kworker/0:10:3123 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d34f7000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:11:3126 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:8413c800 r4:8413c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85093d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0079000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b378c r4:850b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b378c r4:84a06680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413c800 r8:84a066ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06680 r8:80287e08 r7:df9b9e60 r6:84a06c00 r5:8413c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f25c0 INFO: task kworker/0:11:3126 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d36fb000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:12:3128 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8413bc00 r4:8413bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85120f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c8b8c r4:850c8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8b8c r4:84a06a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413bc00 r8:84a06aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06a80 r8:80287e08 r7:df9fde60 r6:84a06d00 r5:8413bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2400 INFO: task kworker/0:12:3128 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d3a31000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 INFO: task kworker/0:13:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:8413a400 r4:8413a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8413a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847f2780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8413a400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c8f8c r4:850c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8f8c r4:84a06b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8413a400 r8:84a06bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06b80 r8:80287e08 r7:df9e9e60 r6:84a06e00 r5:8413a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2600 INFO: task kworker/0:13:3130 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d3e31000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3132 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:841e1800 r4:841e1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85135480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d978c r4:851d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d978c r4:84a06c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e1800 r8:84a06cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06c80 r8:80287e08 r7:dfa11e60 r6:84a06d80 r5:841e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2600 INFO: task kworker/0:14:3132 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d5c6b000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:841e4800 r4:841e4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b40000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0469000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8526bb8c r4:8526b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8526bb8c r4:84a06e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e4800 r8:84a06eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06e80 r8:80287e08 r7:dfa25e60 r6:84a06f00 r5:841e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f27c0 INFO: task kworker/0:15:3134 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:3:3135 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:841e6000 r4:841e6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848584c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8525cb8c r4:8525c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8525cb8c r4:849a1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e6000 r8:849a182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1800 r8:80287e08 r7:e012de60 r6:84a06f80 r5:841e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578a80 INFO: task kworker/1:3:3135 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3138 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:841e5400 r4:841e5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508c340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dbf8c r4:851dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dbf8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e5400 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa29e60 r6:830b8400 r5:841e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f2c40 INFO: task kworker/0:16:3138 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d6536000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:841e3000 r4:841e3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84578f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427d38c r4:8427d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427d38c r4:849a1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e3000 r8:849a1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1a80 r8:80287e08 r7:dfa31e60 r6:84a06300 r5:841e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578dc0 INFO: task kworker/1:4:3140 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000013 r6:dfa49d8c r5:841e0000 r4:841e0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85344300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85272f8c r4:85272c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85272f8c r4:84a06400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e0000 r8:84a0642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a06400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a06400 r8:80287e08 r7:dfa29e60 r6:84a06500 r5:841e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749040 INFO: task kworker/0:17:3142 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:841e2400 r4:841e2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847494c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852d178c r4:852d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d178c r4:8474b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e2400 r8:8474b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b000 r8:80287e08 r7:dfa49e60 r6:8474b080 r5:841e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847492c0 INFO: task kworker/0:18:3144 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d74a5000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3145 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa6dd84 r8:00000002 r7:60000013 r6:dfa6dd8c r5:841e0c00 r4:841e0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547f680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557238c r4:85572000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557238c r4:8474b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e0c00 r8:8474b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b100 r8:80287e08 r7:dfa59e60 r6:8474b180 r5:841e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749300 INFO: task kworker/0:19:3145 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7876000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3147 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:841e3c00 r4:841e3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841e3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514f600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85273b8c r4:85273800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85273b8c r4:849a1b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841e3c00 r8:849a1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1b00 r8:80287e08 r7:dfa3de60 r6:8474b200 r5:841e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578f80 INFO: task kworker/1:5:3147 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7876000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83b33c00 r4:83b33c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b33c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85504380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8557138c r4:85571000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8557138c r4:8474b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b33c00 r8:8474b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b280 r8:80287e08 r7:dfa6de60 r6:8474b380 r5:83b33c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847496c0 INFO: task kworker/0:20:3151 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7f65000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83b30c00 r4:83b30c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b30c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e478c r4:856e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e478c r4:849a1900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b30c00 r8:849a192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1900 r8:80287e08 r7:dfa3de60 r6:8474b400 r5:83b30c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578880 INFO: task kworker/1:6:3155 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d7f65000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3156 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:83b35400 r4:83b35400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b35400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b35400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427d78c r4:8427d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427d78c r4:849a1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b35400 r8:849a1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1b80 r8:80287e08 r7:dfaa1e60 r6:8474b500 r5:83b35400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578f00 INFO: task kworker/1:7:3156 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d82cf000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3159 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000013 r6:dfab5d8c r5:833b9800 r4:833b9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550dac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85387f8c r4:85387c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85387f8c r4:849a1d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b9800 r8:849a1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1d80 r8:80287e08 r7:dfaa1e60 r6:8474b300 r5:833b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578a80 INFO: task kworker/1:8:3159 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d89d4000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3161 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:833bb000 r4:833bb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854aa600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855bf78c r4:855bf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855bf78c r4:849a1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833bb000 r8:849a1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849a1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1e80 r8:80287e08 r7:dfaa1e60 r6:8474b480 r5:833bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8474a040 INFO: task kworker/1:9:3161 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9304000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfacdd84 r8:00000002 r7:60000013 r6:dfacdd8c r5:833bc800 r4:833bc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833bc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855115c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562b38c r4:8562b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562b38c r4:8474b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833bc800 r8:8474b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474b580 r8:80287e08 r7:dfa6de60 r6:8474b600 r5:833bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749fc0 INFO: task kworker/0:21:3162 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: d9304000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3163 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:83b32400 r4:83b32400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b32400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb209000 r4:8474b700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3165 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000113 r6:dfae1d8c r5:833b8000 r4:833b8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855d438c r4:855d4000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf5d84 r8:00000002 r7:60000013 r6:dfaf5d8c r5:833b0c00 r4:833b0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833b0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d34c0 r7:ddde2d80 r6:83018200 r5:856e4b8c r4:849a1c80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858bc040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585bf8c r4:8585bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585bf8c r4:8474b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b0000 r8:8474b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb949000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570078c r4:85700400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570078c r4:840f1680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833b4800 r8:840f16ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:840f1680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840f1680 r8:80287e08 r7:dfaf5e60 r6:8474b880 r5:833b4800 r4:00000001 Exception stack(0xdfb0dfb0 to 0xdfb0dff8) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83c96c00 r4:83c96c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83c96c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85507e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8578338c r4:85783000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:833b5400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:8578378c r4:8474bb00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:83c91800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85859f8c r4:85859c00 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dad38000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:84b72b8c r4:84b72800 Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:83b08000 r5:8570138c r4:85701000 r7:ddde2d80 r6:83018200 r5:8570138c r4:830cc300 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8570278c r4:842bde00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8584878c r4:85848400 r4:830cc100 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r5:8584d78c r4:8584d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dc2de000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3190 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:844daf8c r4:844dac00 r10:61c88647 r9:83b34800 r8:83acaa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd20: dc796000 ed45d000 00000001 80239b98 7f55f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:27 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:83b0bc00 r4:83b0bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b0400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4f78c r4:85d4f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4f78c r4:8474bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0bc00 r8:8474bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8474bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8474bf80 r8:80287e08 r7:dfaf9e60 r6:8474be80 r5:83b0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783100 INFO: task kworker/0:27:3193 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dc796000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:18:3194 blocked for more than 451 seconds. r5:83b0ec00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858c2700 r5:85a28f8c r4:85a28c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84278680 r8:80287e08 r7:dfb59e60 r6:8474bf00 r5:83b0ec00 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:84650c00 r4:84650c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84650c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474ad00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84650c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2938c r4:85a29000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2938c r4:83aca980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84650c00 r8:83aca9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83aca980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfb89fb0 to 0xdfb89ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3197 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3197 tgid:3197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84651800 r4:84651800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84651800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85341bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84651800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d4eb8c r4:85d4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d4eb8c r4:847ffd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84651800 r8:847ffd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ffd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ffd00 r8:80287e08 r7:dfb71e60 r6:847fff80 r5:84651800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783080 INFO: task kworker/0:28:3197 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: dd20: dd836000 ed45d000 00000001 80239b98 7f55f000 00000001 r4:e04bddc0 r5:00001000 r4:dfdc5000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:84650000 r4:84650000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84650000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84650000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 r5:85a29f8c r4:85a29c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a1380 r8:80287e08 r7:dfb59e60 r6:847c8000 r5:84650000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r5:00001000 r4:dfdc5000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84653c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84653c00 r8:849a1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3203 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:84653000 r4:84653000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84653000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c5f0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84653000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2a38c r4:85a2a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2a38c r4:8432ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84653000 r8:8432ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8432ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8432ff00 r8:80287e08 r7:dfb59e60 r6:847c8100 r5:84653000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84749940 INFO: task kworker/1:22:3203 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: de099000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84652400 r8:8329e32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84654800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84654800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a2bb8c r4:85a2b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a2bb8c r4:8408dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84654800 r8:8408dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8408dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8408dc00 r8:80287e08 r7:dfb59e60 r6:847c8200 r5:84654800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84578fc0 INFO: task kworker/1:24:3207 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dee75000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3209 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:84655400 r4:84655400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84655400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:844d978c r4:844d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: dee75000 ed45d000 00000001 80239b98 7f55f000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3211 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83b04800 r4:83b04800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b04800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cfe1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b04800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb883000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6c38c r4:85d6c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d6c38c r4:849ac000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b04800 r8:849ac02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac000 r8:80287e08 r7:dfb59e60 r6:849ac200 r5:83b04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:8413e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:85d5b38c r4:85d5b000 r10:61c88647 r9:8413e000 r8:847c832c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: df765000 ed45d000 00000001 80239b98 7f55f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84656c00 r8:847c842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8400 r8:80287e08 r7:dfbf5e60 r6:847c8480 r5:84656c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783f40 INFO: task kworker/0:30:3215 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: dfdc3000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3218 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:8389e000 r4:8389e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389e000 r7:00000000 r6:83018200 r5:00001000 r4:7f149000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed855000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844dbb8c r4:844db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844dbb8c r4:849ac280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389e000 r8:849ac2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac280 r10:00000000 r9:849ac280 r8:80287e08 r7:dfb59e60 r6:847c8380 r5:8389e000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3220 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000013 r6:dfc19d8c r5:8389ec00 r4:8389ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e568c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f133000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7fb000 r5:85deff8c r4:85defc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8389ec00 r8:849ac1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r9:83018205 r8:841d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f147000 r5:844db78c r4:844db400 r10:61c88647 r9:841d8000 r8:849ac4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:8389d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8389d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e56f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8389d400 r7:00000000 r6:83018200 r5:00001000 r4:7f145000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed849000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:844db38c r4:844db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:844db38c r4:849ac400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8389d400 r8:849ac42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac400 r8:80287e08 r7:dfc19e60 r6:847c8600 r5:8389d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a4840 INFO: task kworker/1:30:3223 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e0de8000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3225 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:838bb000 r4:838bb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:838bb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:85d7ff8c r4:85d7fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849ac580 r8:80287e08 r7:dfc19e60 r6:849ac600 r5:838bb000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:e04bddc0 r5:00001000 r4:dfdc5000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85defb8c r4:85def800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85defb8c r4:849ac380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8412b000 r8:849ac3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac380 r8:80287e08 r7:dfc19e60 r6:849ac780 r5:8412b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:841a4d40 INFO: task kworker/1:32:3228 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e1c7e000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8412d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85e62f8c r4:85e62c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3232 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc49d84 r8:00000002 r7:60000113 r6:dfc49d8c r5:84128c00 r4:84128c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84128c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ba40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84128c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1b3000 r5:85e15b8c r4:85e15800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84128c00 r8:849ac8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:83b28c00 r4:83b28c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b28c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:85e0878c r4:85e08400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e0878c r4:849ac900 r10:00000000 r9:849ac900 r8:80287e08 r7:dfc49e60 r6:849aca80 r5:83b28c00 INFO: task kworker/1:35:3234 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84689800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84689800 r7:00000000 r6:83018200 r5:00001000 r4:7f1b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e1638c r4:85e16000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e1638c r4:849ac980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84689800 r8:849ac9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ac980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ac980 r8:80287e08 r7:dfc55e60 r6:849aca00 r5:84689800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8419c240 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r5:84b72b8c r4:84b72800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85e1578c r4:849acb00 r10:00000000 r9:849acb00 r8:80287e08 r7:dfc69e60 r6:849acb80 r5:8468a400 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3241 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc75d84 r8:00000002 r7:60000113 r6:dfc75d8c r5:8468bc00 r4:8468bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8468bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc75e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ccc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8468bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed26f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d5bb8c r4:85d5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d5bb8c r4:847c8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8468bc00 r8:847c882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8800 r8:80287e08 r7:dfbf5e60 r6:849acc00 r5:8468bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc75fb0 to 0xdfc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2580 INFO: task kworker/0:31:3241 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e2d59000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84688000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d5b78c r4:85d5b400 r7:dddced80 r6:83018000 r5:85d5b78c r4:847c8700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:33 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b0000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8468b000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d6438c r4:85d64000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6438c r4:847c8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8468b000 r8:847c87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8780 r8:80287e08 r7:dfc75e60 r6:849acd00 r5:8468b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2500 INFO: task kworker/0:33:3244 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e3345000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:34:3246 blocked for more than 451 seconds. r5:8468c800 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8468c800 r8:847c89ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6478c r4:85d64400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847c8a00 r8:80287e08 r7:dfc81e60 r6:849ace00 r5:8468d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2780 INFO: task kworker/0:35:3248 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e3e44000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3249 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:8468ec00 r4:8468ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8468ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r5:00001000 r4:ed43f000 r5:85d64f8c r4:85d64c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8468ec00 r8:847c8aac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849f2a00 INFO: task kworker/0:37:3252 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e4911000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3255 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84978c00 r4:84978c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84978c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85d6578c r4:85d65400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84978c00 r8:847c8bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8497a400 r4:8291a680 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d6538c r4:85d65000 r7:dddced80 r6:83018000 r5:85d6538c r4:847c8900 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84978000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6678c r4:85d66400 r7:dddced80 r6:83018000 r5:85d6678c r4:847c8c80 r10:00000000 r9:847c8c80 r8:80287e08 r7:dfcb5e60 r6:8408d580 r5:84978000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e5434000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3263 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:8497bc00 r4:8497bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e1538c r4:85e15000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e1538c r4:8472c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:8472c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8497d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85e1678c r4:8472c180 r10:61c88647 r9:8497d400 r8:8472c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c180 r8:80287e08 r7:dfc69e60 r6:8472c280 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2080 INFO: task kworker/1:39:3267 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e5b03000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bf80 r5:85e16f8c r4:85e16c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8472c080 Exception stack(0xdfac1fb0 to 0xdfac1ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3270 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:84808c00 r4:84808c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84808c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535bec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84808c00 r7:00000000 r6:83018200 r5:00001000 r4:7f143000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e16b8c r4:85e16800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e16b8c r4:8472c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84808c00 r8:8472c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c200 r8:80287e08 r7:dfac1e60 r6:847c8d80 r5:84808c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:41:3270 is blocked on a mutex likely owned by task kworker/1:221:3732. Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8480b000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfae5fb0 to 0xdfae5ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f151000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543478c r4:85434400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543478c r4:8472c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480bc00 r8:8472c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c480 r8:80287e08 r7:dfae5e60 r6:847c8e00 r5:8480bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2780 INFO: task kworker/1:43:3275 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e70fe000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3277 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:8480c800 r4:8480c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8480c800 r7:00000000 r6:83018200 r5:00001000 r4:7f14f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543438c r4:85434000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543438c r4:8472c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480c800 r8:8472c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c580 r8:80287e08 r7:dfafde60 r6:847c8880 r5:8480c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2a00 INFO: task kworker/1:44:3277 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e75b7000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3278 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000013 r6:dfb4dd8c r5:8480d400 r4:8480d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d0bc00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d66f8c r4:85d66c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d66f8c r4:847c8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480d400 r8:847c8eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847c8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c8e80 r8:80287e08 r7:dfcc1e60 r6:847c8f00 r5:8480d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847de1c0 INFO: task kworker/0:42:3278 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 task:kworker/1:45 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r9:83018205 r8:8480e000 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 r5:85e17b8c r4:85e17800 r10:61c88647 r9:8480e000 r8:8472c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfb5dfb0 to 0xdfb5dff8) r4:849e2700 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:00000000 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3283 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:8480ec00 r4:8480ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f14d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85e17f8c r4:85e17c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85e17f8c r4:8472c400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480ec00 r8:8472c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c400 r8:80287e08 r7:dfb5de60 r6:8477f000 r5:8480ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2640 INFO: task kworker/1:46:3283 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80050013 ffffffff r4:e04bddc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:47 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:8480a400 r4:8480a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8480a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8480a400 r7:00000000 r6:83018200 r5:00001000 r4:7f155000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85434f8c r4:85434c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85434f8c r4:8472c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8480a400 r8:8472c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c700 r8:80287e08 r7:dfb5de60 r6:8477f080 r5:8480a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e2e80 INFO: task kworker/1:47:3284 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e80bc000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8543578c r4:85435400 r10:61c88647 r9:84809800 r8:8472c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849e2640 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:84b72b8c r4:84b72800 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3287 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84808000 r4:84808000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84808000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8543538c r4:85435000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdfbadfb0 to 0xdfbadff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84930000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d6738c r4:85d67000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8477f200 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3291 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:84931800 r4:84931800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84931800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85365bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84931800 r7:00000000 r6:83018200 r5:00001000 r4:7f165000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed867000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85435b8c r4:85435800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85435b8c r4:8472c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84931800 r8:8472c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472c500 r8:80287e08 r7:dfba1e60 r6:8477f280 r5:84931800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 r9:83018205 r8:84932400 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 r5:8543638c r4:85436000 r10:61c88647 r9:84932400 r8:8472c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472d1c0 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r5:85435f8c r4:85435c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:8472d100 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3300 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3300 tgid:3300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84936000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8543678c r4:85436400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018205 r8:84935400 r7:00000000 r6:83018200 r5:00001000 r4:7f16d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85436b8c r4:85436800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85436b8c r4:8472cb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:8472cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472cb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8472cb00 r8:80287e08 r7:dfccde60 r6:8477f680 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d640 INFO: task kworker/1:55:3302 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e9460000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/1:56 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:85436f8c r4:85436c00 r10:61c88647 r9:84934800 r8:8472cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8472d800 INFO: task kworker/1:56:3305 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: e9f3e000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:8497ec00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84748140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f171000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8543738c r4:85437000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8543738c r4:8472ca80 r10:61c88647 r9:8497ec00 r8:8472caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8472d6c0 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 task:kworker/0:86 state:D stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0029d84 r8:00000002 r7:60000113 r6:e0029d8c r5:8492a400 r4:8492a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0029e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84aebb8c r4:84aeb800 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849a8580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: e9f3e000 ed45d000 00000001 80239b98 7f55f000 00000001 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:3734 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c1d84 r8:00000002 r7:60000113 r6:e04c1d8c r5:84ba2400 r4:84ba2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b72f8c r4:84b72c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ba2400 r8:84b1cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08 r5:84b7338c r4:84b73000 r10:61c88647 r9:84ba3c00 r8:849ffeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c9fb0 to 0xe04c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b39400 INFO: task kworker/1:223:3736 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ea9c8000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe04bdfb0 to 0xe04bdff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ba3000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0031000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af478c r4:84af4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af478c r4:849a8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba3000 r8:849a87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8780 r8:80287e08 r7:e00d1e60 r6:847d7c80 r5:84ba3000 r4:84859d80 dd20: ea9c8000 ed45d000 00000001 80239b98 7f55f000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Not tainted 6.15.0-rc7-syzkaller #0 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d72c0 r5:8472b78c r4:8472b400 r7:dddced80 r6:83018000 r5:8472b78c r4:849a8800 r10:00000000 r9:849a8800 r8:80287e08 r7:e04d1e60 r6:84b3b000 r5:84ba4800 r4:84859d80 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:3741 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:224 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84ba6c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b73f8c r4:84b73c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ba6c00 r8:84b3b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b39880 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:e04bddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:3743 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:e04e1d84 r8:00000002 r7:60000013 r6:e04e1d8c r5:84ba5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39ac0 r5:84b7378c r4:84b73400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84ba6000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b73b8c r4:84b73800 r7:ddde2d80 r6:83018200 r5:84b73b8c r4:84b3b180 Exception stack(0xe04d5fb0 to 0xe04d5ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eb26c000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:3749 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:3749 tgid:3749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84ba8000 r4:84ba8000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ba8000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39f00 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b7c38c r4:84b7c000 r10:61c88647 r9:84ba8000 r8:84b3b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ba8c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7cf8c r4:84b7cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7cf8c r4:84b3b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba8c00 r8:84b3b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b480 r8:80287e08 r7:e04b9e60 r6:84b3b600 r5:84ba8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b24e40 INFO: task kworker/1:228:3750 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eb5a6000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b7c78c r4:84b7c400 r10:61c88647 r9:84ba9800 r8:84b3b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/1:230:3754 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:84baa400 r4:84baa400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84baa400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baa400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7cb8c r4:84b7c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7cb8c r4:84b3b580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baa400 r8:84b3b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b580 r8:80287e08 r7:e04e5e60 r6:84b3b680 r5:84baa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04edfb0 to 0xe04edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3757 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f1d84 r8:00000002 r7:60000013 r6:e04f1d8c r5:84bab000 r4:84bab000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bab000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bab000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7d38c r4:84b7d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7d38c r4:84b3b780 r4:84b3b780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84babc00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:84b7d78c r4:84b7d400 r4:84b3b900 Exception stack(0xe04f5fb0 to 0xe04f5ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:3761 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84bac800 r4:84bac800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bac800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bac800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0507000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7df8c r4:84b7dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7df8c r4:84b3b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bac800 r8:84b3b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3b980 r8:80287e08 r7:e04f5e60 r6:84b3ba80 r5:84bac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f9fb0 to 0xe04f9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:234:3762 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04fdd84 r8:00000002 r7:60000113 r6:e04fdd8c r5:84bad400 r4:84bad400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bad400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04fde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a600 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7db8c r4:84b7d800 r7:ddde2d80 r6:83018200 r5:84b7db8c r4:84b3bb00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84bae000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3a980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bae000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7e38c r4:84b7e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7e38c r4:84b3bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bae000 r8:84b3bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3bb80 r8:80287e08 r7:e04f9e60 r6:84b3bc00 r5:84bae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0505fb0 to 0xe0505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3a800 INFO: task kworker/1:235:3765 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: eca28000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b72b8c r4:84b72800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84baec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e051b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7e78c r4:84b7e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7e78c r4:84b3bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84baec00 r8:84b3bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3bc80 r8:80287e08 r7:e0505e60 r6:84b3bd00 r5:84baec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0519fb0 to 0xe0519ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84b3a8c0 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b72b8c r4:84b72800 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84bb0000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b7eb8c r4:84b7e800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b3aa00 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r7:ddde2d80 r6:83018200 r5:84b72b8c r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3769 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3769 tgid:3769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:84bb1800 r4:84bb1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7ef8c r4:84b7ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7ef8c r4:84b3be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb1800 r8:84b3be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3be00 r8:80287e08 r7:e0525e60 r6:84b3be80 r5:84bb1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b3ad00 INFO: task kworker/1:238:3769 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ecf3d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 INFO: task kworker/0:91:3772 blocked for more than 452 seconds. Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:84bb3000 r4:84bb3000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb3000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84bb3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84af438c r4:84af4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84af438c r4:849a8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb3000 r8:849a88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8880 r8:80287e08 r7:e04d1e60 r6:84b3bf80 r5:84bb3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe053dfb0 to 0xe053dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7280 INFO: task kworker/0:91:3772 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: ecf3d000 ed45d000 00000001 80239b98 7f55f000 00000001 dd40: 82ac15a0 7f55f000 ed45d000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b391c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bb3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:84b7fb8c r4:84b7f800 r10:61c88647 r9:84bb3c00 r8:849c102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 7f600000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 task:kworker/1:240 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84bb4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c2100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df973000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7f38c r4:84b7f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7f38c r4:849c1080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb4800 r8:849c10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1080 r8:80287e08 r7:e0545e60 r6:849c1280 r5:84bb4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c20c0 INFO: task kworker/1:240:3775 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7f600000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3777 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84bb0c00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b7f78c r4:84b7f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bb0c00 r8:849c112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 90050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bb5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b7ff8c r4:84b7fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b7ff8c r4:849c1200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb5400 r8:849c122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1200 r8:80287e08 r7:e0545e60 r6:849c1400 r5:84bb5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2480 INFO: task kworker/1:242:3781 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7fbd8000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500078c r4:85000400 r7:ddde2d80 r6:83018200 r5:8500078c r4:849c1480 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8500038c r4:849c1500 r10:00000000 r9:849c1500 r8:80287e08 r7:e0551e60 r6:849c1680 r5:84bb6c00 r4:849c2940 INFO: task kworker/1:244:3783 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 7fed4000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:3786 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85000b8c r4:85000800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bb2400 r8:849c15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 90050013 ffffffff r4:e04bddc0 r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bb8c00 r8:849c162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:84bb9800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bb9800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c2ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bb9800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500138c r4:85001000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500138c r4:849c1880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bb9800 r8:849c18ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1880 r8:80287e08 r7:e0511e60 r6:849c1700 r5:84bb9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0561fb0 to 0xe0561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2c40 INFO: task kworker/1:247:3790 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 80b22000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3793 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:84bba400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bba400 r8:849c192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1900 r8:80287e08 r7:e0561e60 r6:849c1a00 r5:84bba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe055dfb0 to 0xe055dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c2f80 INFO: task kworker/1:248:3793 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 80fb6000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a7c0 r5:8500238c r4:85002000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849c1a80 r8:80287e08 r7:e055de60 r6:849c1980 r5:84bbb000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84bbc800 r8:849c1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:3797 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e058dd84 r8:00000002 r7:60000113 r6:e058dd8c r5:84bbd400 r4:84bbd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84bbd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e058de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84bbd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85001f8c r4:85001c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85001f8c r4:849c1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84bbd400 r8:849c1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1b80 r8:80287e08 r7:e0565e60 r6:849c1c00 r5:84bbd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84bbbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:85002f8c r4:85002c00 r10:61c88647 r9:84bbbc00 r8:849c1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 dd20: 81a1f000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3802 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84acb000 r4:84acb000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acb000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84af5f8c r4:84af5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849a8a80 Exception stack(0xe0581fb0 to 0xe0581ff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r5:00001000 r4:e0471000 r5:8500338c r4:85003000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 81a1f000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3806 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05add84 r8:00000002 r7:60000113 r6:e05add8c r5:84acd400 r4:84acd400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acd400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0129000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500278c r4:85002400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500278c r4:849c1e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84acd400 r8:849c1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1e80 r8:80287e08 r7:e0591e60 r6:849a8b80 r5:84acd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05adfb0 to 0xe05adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462a880 INFO: task kworker/1:253:3806 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 820ca000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:3809 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05c9d84 r8:00000002 r7:60000113 r6:e05c9d8c r5:84aca400 r4:84aca400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84aca400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0453000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85002b8c r4:85002800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85002b8c r4:849c1f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84aca400 r8:849c1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849c1f00 r10:00000000 r9:849c1f00 r8:80287e08 r7:e0591e60 r6:849a8c00 r5:84aca400 INFO: task kworker/1:254:3809 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 827c5000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:3810 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d5d84 r8:00000002 r7:60000113 r6:e05d5d8c r5:84acc800 r4:84acc800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84acc800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e048f000 r5:85003b8c r4:85003800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84bbec00 r4:8291a680 r4:00000000 r4:00000000 r5:8500378c r4:85003400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849f3000 r8:80287e08 r7:e05d5e60 r6:849f3100 r5:84bbec00 INFO: task kworker/1:256:3812 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 82df5000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r4:849ffe00 Exception stack(0xe04bdfb0 to 0xe04bdff8) r4:84b392c0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84af4b8c r4:84af4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84bbe000 r8:849a8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8e00 r8:80287e08 r7:e0581e60 r6:849f3180 r5:84bbe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a1fb0 to 0xe05a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7200 INFO: task kworker/0:94:3814 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 82fab000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:3816 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:85048c00 r4:85048c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85048c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r5:85003f8c r4:85003c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:849f3300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r4:00000000 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500c38c r4:8500c000 r10:61c88647 r9:85048000 r8:849f32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3280 r8:80287e08 r7:e05e1e60 r6:849f3380 r5:85048000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d9fb0 to 0xe05d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7240 INFO: task kworker/1:258:3820 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 835f9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3821 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8500cb8c r4:8500c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe059dfb0 to 0xe059dff8) task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8500c78c r4:8500c400 r4:849f3500 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7440 INFO: task kworker/1:260:3822 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 839f1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3825 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05f1d84 r8:00000002 r7:60000013 r6:e05f1d8c r5:8504bc00 r4:8504bc00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504bc00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8500cf8c r4:8500cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 83f69000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:84b392c0 Workqueue: events bpf_prog_free_deferred r5:8504c800 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 8449c000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:3830 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:8504d400 r4:8504d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8500d78c r4:8500d400 r7:ddde2d80 r6:83018200 r5:8500d78c r4:849f3600 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 84952000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:8504e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r9:83018205 r8:8504e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8462a100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500e38c r4:8500e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500e38c r4:849f3a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504ec00 r8:849f3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3a00 r8:80287e08 r7:e062de60 r6:849f3b80 r5:8504ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7980 INFO: task kworker/1:265:3833 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 84be9000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04bdfb0 to 0xe04bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b392c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:3835 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:3835 tgid:3835 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85050000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85050000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 r5:8500df8c r4:8500dc00 r10:61c88647 r9:85050000 r8:849f3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe04bdd28 to 0xe04bdd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85050c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85050c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85050c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500e78c r4:8500e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500e78c r4:849f3c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85050c00 r8:849f3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3c00 r8:80287e08 r7:e0641e60 r6:849f3c80 r5:85050c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83ac7bc0 INFO: task kworker/1:267:3837 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 850cb000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 Exception stack(0xe04bdfb0 to 0xe04bdff8) INFO: task kworker/1:268:3841 blocked for more than 453 seconds. r4:85052400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r5:00001000 r4:e0671000 r5:8500ef8c r4:8500ec00 r10:61c88647 r9:85052400 r8:849f3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 855b8000 dfdc7000 00000001 80239b98 7f561000 00000001 r4:e04bddc0 r5:00001000 r4:ed727000 r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85053000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2f140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85053000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8500eb8c r4:8500e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500eb8c r4:849f3e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85053000 r8:849f3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849f3e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849f3e00 r8:80287e08 r7:e0659e60 r6:849f3e80 r5:85053000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2f240 INFO: task kworker/1:269:3842 is blocked on a mutex likely owned by task kworker/1:221:3732. task:kworker/1:221 state:R running task stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84ba1800 r8:80200be4 r7:e04bdd5c r6:ffffffff r5:84ba1800 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe04bdd28 to 0xe04bdd70) dd20: 85ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 dd40: 82ac15a0 7f561000 dfdc7000 8280c928 82ac21c4 e04bdda4 e04bdda8 e04bdd78 dd60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ba1800 r7:00000000 r6:83018200 r5:00001000 r4:7f563000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed727000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ef678c r4:85ef6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ef678c r4:849ffe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ba1800 r8:849ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849ffe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:270:3844 blocked for more than 453 seconds. r4:85053c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0675e08 r9:83018205 r8:85053c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000 r5:8500f38c r4:8500f000 r4:849f3f80 Exception stack(0xe0675fb0 to 0xe0675ff8) INFO: task kworker/1:270:3844 is blocked on a mutex likely owned by task kworker/1:221:3732. dd20: 85ac1000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c8fcc0 r5:85ef678c r4:85ef6400 r10:00000000 r9:849ffe00 r8:80287e08 r7:e04b5e60 r6:849fff80 r5:84ba1800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85054800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r9:83018205 r8:85054800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000 r5:8500f78c r4:8500f400 r10:61c88647 r9:85054800 r8:849f30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: 85f36000 dfdc7000 00000001 80239b98 7f561000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e04bddc0 r5:e04bde08 r4:e04bddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:000000 <> 08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc400 r8:80287e08 r7:ec5a5e60 r6:857c5b80 r5:8575c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a9fb0 to 0xec5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d3d40 INFO: task kworker/1:741:5735 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: be6f1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5738 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec591d84 r8:00000002 r7:60000113 r6:ec591d8c r5:8570b000 r4:8570b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec591e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb807000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e738c r4:856e7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e738c r4:857dc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570b000 r8:857dc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc200 r8:80287e08 r7:ec5a5e60 r6:857dc480 r5:8570b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df380 INFO: task kworker/1:742:5738 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf095000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:743:5740 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:743 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b1d84 r8:00000002 r7:60000013 r6:ec5b1d8c r5:85708000 r4:85708000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85708000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85708000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e7f8c r4:856e7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e7f8c r4:857dc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85708000 r8:857dc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc500 r8:80287e08 r7:ec591e60 r6:857dc580 r5:85708000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df1c0 INFO: task kworker/1:743:5740 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf095000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5741 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5add84 r8:00000002 r7:60000113 r6:ec5add8c r5:8570d400 r4:8570d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e778c r4:856e7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e778c r4:857dc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570d400 r8:857dc62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc600 r8:80287e08 r7:ec5b1e60 r6:857dc680 r5:8570d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df1c0 INFO: task kworker/1:744:5741 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:5742 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:5742 tgid:5742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:8570e000 r4:8570e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b0e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85782f8c r4:85782c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85782f8c r4:857c5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570e000 r8:857c5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c5c00 r8:80287e08 r7:ebd79e60 r6:857dc700 r5:8570e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1080 INFO: task kworker/0:556:5742 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5744 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5744 tgid:5744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5bdd84 r8:00000002 r7:60000013 r6:ec5bdd8c r5:8570c800 r4:8570c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8570c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e7b8c r4:856e7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e7b8c r4:857dc780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570c800 r8:857dc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc780 r8:80287e08 r7:ec5b1e60 r6:857c5c80 r5:8570c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df540 INFO: task kworker/1:745:5744 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: bf4ad000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:746:5747 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:746 state:D stack:0 pid:5747 tgid:5747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c9d84 r8:00000002 r7:60000113 r6:ec5c9d8c r5:8575ec00 r4:8575ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8575ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8427e78c r4:8427e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8427e78c r4:857dc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575ec00 r8:857dc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc900 r8:80287e08 r7:ec5b1e60 r6:857c5d00 r5:8575ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c9fb0 to 0xec5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857df800 INFO: task kworker/1:746:5747 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0211000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84ad0000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ec78c r4:856ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ec78c r4:857dc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad0000 r8:857dc8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dc880 r8:80287e08 r7:ec5c9e60 r6:857c5d80 r5:84ad0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d1fb0 to 0xec5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfa40 INFO: task kworker/1:747:5749 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) r4:e0029dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ad0c00 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5752 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5752 tgid:5752 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec5ddd84 r8:00000002 r7:60000113 r6:ec5ddd8c r5:84ad2400 r9:83018205 r8:84ad2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0029d28 to 0xe0029d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5753 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5753 tgid:5753 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ad3000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:856ecb8c r4:856ec800 r10:61c88647 r9:84ad3000 r8:857dc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0029dc0 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fa0: 00000000 00000000 00000000 00000000 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:856edf8c r4:856edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856edf8c r4:857dcb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad5400 r8:857dcbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcb80 r8:80287e08 r7:ec5e1e60 r6:857c5f80 r5:84ad5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfec0 INFO: task kworker/1:751:5757 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0e0a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5758 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000013 r6:ec5f1d8c r5:84ad3c00 r4:84ad3c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad3c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d3f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ecf8c r4:856ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ecf8c r4:857dcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad3c00 r8:857dcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcb00 r8:80287e08 r7:ec5ede60 r6:85661d80 r5:84ad3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857dfec0 INFO: task kworker/1:752:5758 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c0e0a000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5760 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5760 tgid:5760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f9d84 r8:00000002 r7:60000113 r6:ec5f9d8c r5:84ad4800 r4:84ad4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85672f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ed38c r4:856ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ed38c r4:857dcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad4800 r8:857dcc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcc00 r8:80287e08 r7:ec5ede60 r6:85661b80 r5:84ad4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f9fb0 to 0xec5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d31c0 INFO: task kworker/1:753:5760 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c118c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5762 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5762 tgid:5762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:84ad6000 r4:84ad6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ed78c r4:856ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ed78c r4:857dcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6000 r8:857dccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcc80 r8:80287e08 r7:ec5ede60 r6:857c0000 r5:84ad6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d32c0 INFO: task kworker/1:754:5762 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c118c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5764 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec609d84 r8:00000002 r7:60000113 r6:ec609d8c r5:84ad6c00 r4:84ad6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856edb8c r4:856ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856edb8c r4:857dcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad6c00 r8:857dcd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcd00 r8:80287e08 r7:ec5ede60 r6:857c0080 r5:84ad6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6100 INFO: task kworker/1:755:5764 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1814000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5766 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec611d84 r8:00000002 r7:60000113 r6:ec611d8c r5:8575d400 r4:8575d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c66c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8575d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eeb8c r4:856ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eeb8c r4:857dce00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575d400 r8:857dce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dce00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dce00 r8:80287e08 r7:ec5ede60 r6:857c0100 r5:8575d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6140 INFO: task kworker/1:756:5766 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1814000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5769 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec619d84 r8:00000002 r7:60000013 r6:ec619d8c r5:84ad1800 r4:84ad1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ad1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec619e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad1800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ee38c r4:856ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ee38c r4:857dce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ad1800 r8:857dceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dce80 r8:80287e08 r7:ec611e60 r6:857c0180 r5:84ad1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6400 INFO: task kworker/1:757:5769 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1f0e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5770 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5770 tgid:5770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec61dd84 r8:00000002 r7:60000113 r6:ec61dd8c r5:85760000 r4:85760000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ee78c r4:856ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ee78c r4:857dcd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760000 r8:857dcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcd80 r8:80287e08 r7:ec611e60 r6:857c0200 r5:85760000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6400 INFO: task kworker/1:758:5770 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c1f0e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5772 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5772 tgid:5772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:85761800 r4:85761800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85761800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eff8c r4:856efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eff8c r4:857dcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85761800 r8:857dcfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf80 r8:80287e08 r7:ec611e60 r6:857c0280 r5:85761800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c64c0 INFO: task kworker/1:759:5772 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2579000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5774 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec62dd84 r8:00000002 r7:60000013 r6:ec62dd8c r5:85760c00 r4:85760c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85760c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebceb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856eef8c r4:856eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856eef8c r4:8566f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760c00 r8:8566f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8566f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8566f400 r8:80287e08 r7:ec625e60 r6:857c0300 r5:85760c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6600 INFO: task kworker/1:760:5774 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2dd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5776 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5776 tgid:5776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:85762400 r4:85762400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85762400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ef38c r4:856ef000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ef38c r4:857ba000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85762400 r8:857ba02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba000 r8:80287e08 r7:ec625e60 r6:857c0380 r5:85762400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6740 INFO: task kworker/1:761:5776 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c2dd7000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5779 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec641d84 r8:00000002 r7:60000113 r6:ec641d8c r5:85763000 r4:85763000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ef78c r4:856ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ef78c r4:857ba180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763000 r8:857ba1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba180 r8:80287e08 r7:ec625e60 r6:857c0400 r5:85763000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6880 INFO: task kworker/1:762:5779 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5780 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec645d84 r8:00000002 r7:60000113 r6:ec645d8c r5:85763c00 r4:85763c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85763c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856efb8c r4:856ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856efb8c r4:857ba200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763c00 r8:857ba22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba200 r8:80287e08 r7:ec625e60 r6:857c0480 r5:85763c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c69c0 INFO: task kworker/1:763:5780 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5783 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000013 r6:ec659d8c r5:85766c00 r4:85766c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85766c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec64d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f038c r4:856f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f038c r4:857ba080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766c00 r8:857ba0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba080 r8:80287e08 r7:ec625e60 r6:857c0500 r5:85766c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6b00 INFO: task kworker/1:764:5783 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:765:5785 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:765 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec675d84 r8:00000002 r7:60000113 r6:ec675d8c r5:85766000 r4:85766000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85766000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f178c r4:856f1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f178c r4:857ba280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766000 r8:857ba2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba280 r8:80287e08 r7:ec659e60 r6:857c0580 r5:85766000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c6d80 INFO: task kworker/1:765:5785 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c366e000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r5:856f078c r4:856f0400 r10:00000000 r9:857ba380 r8:80287e08 r7:ec675e60 r6:857c0600 r5:8575e000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c6f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85768000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f0b8c r4:856f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f0b8c r4:857ba400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85768000 r8:857ba42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba400 r8:80287e08 r7:ec675e60 r6:857c0680 r5:85768000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857d1140 INFO: task kworker/1:767:5788 is blocked on a mutex likely owned by task kworker/0:86:3596. Call trace: 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85769800 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683040 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:857ba300 r8:80287e08 r7:ec675e60 r6:857c0700 r5:85769800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683080 INFO: task kworker/1:768:5790 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c510b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683180 r5:856f138c r4:856f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857ba480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba480 r8:80287e08 r7:ec675e60 r6:857c0780 r5:8576b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6adfb0 to 0xec6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683240 INFO: task kworker/1:769:5792 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c553b000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5794 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6b9d84 r8:00000002 r7:60000113 r6:ec6b9d8c r5:85768c00 r4:85768c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85768c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r5:00001000 r4:e06b1000 r5:856f1f8c r4:856f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683500 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f1b8c r4:856f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f1b8c r4:857ba600 r10:61c88647 r9:8576bc00 r8:857ba62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0029d28 to 0xe0029d70) r5:800d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:5798 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a5d84 r8:00000002 r7:60000113 r6:ec6a5d8c r5:8576c800 r4:8576c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fb640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85783b8c r4:85783800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85783b8c r4:857c0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576c800 r8:857c092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c0900 r8:80287e08 r7:ebd79e60 r6:857c0a80 r5:8576c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a5fb0 to 0xec6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0dc0 INFO: task kworker/0:557:5798 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6399000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5801 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e1d84 r8:00000002 r7:60000113 r6:ec6e1d8c r5:8576ec00 r4:8576ec00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576ec00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f238c r4:856f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f238c r4:857ba500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576ec00 r8:857ba52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba500 r8:80287e08 r7:ec6b9e60 r6:857c0980 r5:8576ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e1fb0 to 0xec6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856835c0 INFO: task kworker/1:772:5801 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6399000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:773:5803 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5803 tgid:5803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8576a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e9e08 r9:83018205 r8:8576a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:856f2b8c r4:856f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2b8c r4:857ba780 r10:61c88647 r9:8576a400 r8:857ba7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 r5:00001000 r4:dfe13000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5804 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6edd84 r8:00000002 r7:60000113 r6:ec6edd8c r5:8576e000 r4:8576e000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576e000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f278c r4:856f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f278c r4:857ba680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576e000 r8:857ba6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba680 r8:80287e08 r7:ec6e9e60 r6:857c0b00 r5:8576e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856834c0 INFO: task kworker/1:774:5804 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c6ee3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:775:5806 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:775 state:D stack:0 pid:5806 tgid:5806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6f5d84 r8:00000002 r7:60000113 r6:ec6f5d8c r5:85764800 r4:85764800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85764800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85764800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb709000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f338c r4:856f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f338c r4:857ba800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85764800 r8:857ba82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba800 r8:80287e08 r7:ec6e9e60 r6:857c0b80 r5:85764800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683a40 INFO: task kworker/1:775:5806 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85765400 r5:85765400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6fde08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f2f8c r4:856f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2f8c r4:857ba880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85765400 r8:857ba8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba880 r8:80287e08 r7:ec6f5e60 r6:857c0c00 r5:85765400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683900 INFO: task kworker/1:776:5808 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7138000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5811 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5811 tgid:5811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:85771800 r4:85771800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85771800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85771800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f378c r4:856f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f378c r4:857ba700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85771800 r8:857ba72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba700 r8:80287e08 r7:ec6f5e60 r6:857c0c80 r5:85771800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec709fb0 to 0xec709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683ac0 INFO: task kworker/1:777:5811 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7a31000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:778:5813 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:778 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec711d84 r8:00000002 r7:60000013 r6:ec711d8c r5:85772400 r4:85772400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85772400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85772400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f438c r4:856f4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f438c r4:857ba900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85772400 r8:857ba92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba900 r8:80287e08 r7:ec709e60 r6:857c0d00 r5:85772400 Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683d00 INFO: task kworker/1:778:5813 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7a31000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5814 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5814 tgid:5814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec715d84 r8:00000002 r7:60000113 r6:ec715d8c r5:85770c00 r4:85770c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85683f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85770c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb939000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f3b8c r4:856f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3b8c r4:857baa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857baa00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683d00 INFO: task kworker/1:779:5814 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7fc1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5816 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5816 tgid:5816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec71dd84 r8:00000002 r7:60000013 r6:ec71dd8c r5:85770000 r4:85770000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b0040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85770000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f3f8c r4:856f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3f8c r4:857baa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85770000 r8:857baaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857baa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857baa80 r8:80287e08 r7:ec711e60 r6:857c0e00 r5:85770000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0fc0 INFO: task kworker/1:780:5816 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c7fc1000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5818 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec725d84 r8:00000002 r7:60000113 r6:ec725d8c r5:85773000 r4:85773000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f538c r4:856f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f538c r4:857ba980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85773000 r8:857ba9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba980 r8:80287e08 r7:ec711e60 r6:857c0e80 r5:85773000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec725fb0 to 0xec725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85683400 INFO: task kworker/1:781:5818 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 Exception stack(0xe0029d28 to 0xe0029d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5820 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5820 tgid:5820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec72dd84 r8:00000002 r7:60000013 r6:ec72dd8c r5:85775400 r4:85775400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85775400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d1a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85775400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f478c r4:856f4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f478c r4:857ba100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85775400 r8:857ba12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857ba100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ba100 r8:80287e08 r7:ec725e60 r6:857c0f00 r5:85775400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec72dfb0 to 0xec72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0940 INFO: task kworker/1:782:5820 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5822 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5822 tgid:5822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec735d84 r8:00000002 r7:60000113 r6:ec735d8c r5:85774800 r4:85774800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85774800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec735e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f4b8c r4:856f4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f4b8c r4:857bab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85774800 r8:857babac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bab80 r8:80287e08 r7:ec725e60 r6:857c0f80 r5:85774800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec735fb0 to 0xec735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8080 INFO: task kworker/1:783:5822 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:82ac21e4 r4:e0029dc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5824 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85773c00 r4:85773c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f4f8c r4:856f4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f4f8c r4:857bac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85773c00 r8:857bac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bac00 r8:80287e08 r7:ec725e60 r6:854b5000 r5:85773c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8200 INFO: task kworker/1:784:5824 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c8e44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5826 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5826 tgid:5826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec745d84 r8:00000002 r7:60000113 r6:ec745d8c r5:85776000 r4:85776000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85776000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85776000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f578c r4:856f5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f578c r4:857bac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776000 r8:857bacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bac80 r8:80287e08 r7:ec725e60 r6:854b5080 r5:85776000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8400 INFO: task kworker/1:785:5826 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c8e44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5828 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5828 tgid:5828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec755d84 r8:00000002 r7:60000013 r6:ec755d8c r5:85776c00 r4:85776c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85776c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85776c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f5f8c r4:856f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5f8c r4:857bab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776c00 r8:857bab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bab00 r8:80287e08 r7:ec745e60 r6:854b5100 r5:85776c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f82c0 INFO: task kworker/1:786:5828 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c92dd000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:787:5832 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:787 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c1d84 r8:00000002 r7:60000013 r6:ec5c1d8c r5:848c0000 r4:848c0000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c0000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f5b8c r4:856f5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5b8c r4:857bad00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0000 r8:857bad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bad00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bad00 r8:80287e08 r7:ec755e60 r6:854b5180 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8380 INFO: task kworker/1:787:5832 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9524000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5834 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5834 tgid:5834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:848c0c00 r4:848c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec757000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f638c r4:856f6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f638c r4:857bae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0c00 r8:857bae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bae00 r8:80287e08 r7:ec755e60 r6:854b5300 r5:848c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8680 INFO: task kworker/1:788:5834 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c970c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5836 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:789 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec76dd84 r8:00000002 r7:60000013 r6:ec76dd8c r5:848c1800 r4:848c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec771000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f6b8c r4:856f6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f6b8c r4:857baf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c1800 r8:857baf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857baf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857baf00 r8:80287e08 r7:ec75de60 r6:854b5200 r5:848c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f87c0 INFO: task kworker/1:789:5836 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c970c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5837 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec775d84 r8:00000002 r7:60000013 r6:ec775d8c r5:848c2400 r4:848c2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec775e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f89c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec763000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f678c r4:856f6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f678c r4:857dcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c2400 r8:857dcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857dcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857dcf00 r8:80287e08 r7:ec76de60 r6:854b5280 r5:848c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec775fb0 to 0xec775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8ac0 INFO: task kworker/1:790:5837 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r5:84aebb8c r4:84aeb800 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5839 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c5d84 r8:00000002 r7:60000013 r6:ec6c5d8c r5:85709800 r4:85709800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85709800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85709800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f6f8c r4:856f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f6f8c r4:857bad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85709800 r8:857badac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857bad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857bad80 r8:80287e08 r7:ec76de60 r6:857baf80 r5:85709800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c5fb0 to 0xec6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8a40 INFO: task kworker/1:791:5839 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:792:5842 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5842 tgid:5842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:848c3000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:ec783000 r5:856f738c r4:856f7000 r7:ddde2d80 r6:83018200 r5:856f738c r4:854f2000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3000 r8:854f202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2000 r8:80287e08 r7:ec6c5e60 r6:854b5380 r5:848c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec795fb0 to 0xec795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8c80 INFO: task kworker/1:792:5842 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: c9f39000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:848c3c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f778c r4:856f7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f778c r4:854f2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3c00 r8:854f20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2080 r8:80287e08 r7:ec795e60 r6:854b5400 r5:848c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8ac0 INFO: task kworker/1:793:5844 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca380000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5846 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:848c4800 r4:848c4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f7f8c r4:856f7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f7f8c r4:854f2200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:854f222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2200 r8:80287e08 r7:ec7ade60 r6:854b5480 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f8e40 INFO: task kworker/1:794:5846 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca6b8000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfe13000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:795:5848 blocked for more than 478 seconds. Call trace: r4:848c5400 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec7bf000 r5:856f7b8c r4:856f7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f2280 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ca902000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:5853 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec749d84 r8:00000002 r7:60000113 r6:ec749d8c r5:848c6000 r4:848c6000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a878c r4:857a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a878c r4:854b5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6000 r8:854b55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5580 r8:80287e08 r7:ebd79e60 r6:854b5700 r5:848c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 Workqueue: events bpf_prog_free_deferred r4:848c6c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c6c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478fb8c r4:8478f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478fb8c r4:854b5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6c00 r8:854b562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5600 r8:80287e08 r7:ec749e60 r6:854b5680 r5:848c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4240 INFO: task kworker/0:559:5854 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cad28000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Exception stack(0xe0029fb0 to 0xe0029ff8) r4:8462f100 task:kworker/0:560 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 r9:83018005 r8:85040000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8478f78c r4:8478f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8478f78c r4:854b5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040000 r8:854b57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5780 r8:80287e08 r7:ec749e60 r6:854b5900 r5:85040000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4440 INFO: task kworker/0:560:5856 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cadb3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85040c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594a340 r5:85701f8c r4:85701c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f2300 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5859 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5859 tgid:5859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d5d84 r8:00000002 r7:60000113 r6:ec7d5d8c r5:8576d400 r4:8576d400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576d400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8576d400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857abf8c r4:857abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857abf8c r4:854f2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576d400 r8:854f23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2380 r8:80287e08 r7:ec7cde60 r6:854f2100 r5:8576d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b7580 INFO: task kworker/1:797:5859 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb290000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8570ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7dde08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a838c r4:857a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a838c r4:854b5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570ec00 r8:854b58ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5880 r8:80287e08 r7:ec749e60 r6:854f2180 r5:8570ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7ddfb0 to 0xec7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4500 INFO: task kworker/0:561:5861 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb290000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:562 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857a8f8c r4:857a8c00 r10:61c88647 r9:84a62400 r8:854b5aac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec7e5fb0 to 0xec7e5ff8) r4:854f45c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cb519000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:5864 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7e9d84 r8:00000002 r7:60000113 r6:ec7e9d8c r5:856c0000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:856c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:857a8b8c r4:857a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:854b5b00 r8:80287e08 r7:ec7e5e60 r6:854f2480 r5:856c0000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0029d28 to 0xe0029d70) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7f5d84 r8:00000002 r7:60000013 r6:ec7f5d8c r5:856c0c00 r4:856c0c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c0c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a938c r4:857a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a938c r4:854b5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0c00 r8:854b59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5980 r8:80287e08 r7:ec7e5e60 r6:854f2500 r5:856c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4840 INFO: task kworker/0:564:5867 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cba8f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:565:5869 blocked for more than 478 seconds. Call trace: r4:856c3000 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857ab38c r4:857ab000 r7:dddced80 r6:83018000 r5:857ab38c r4:854b5b80 r10:61c88647 r9:856c3000 r8:854b5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854f4980 INFO: task kworker/0:565:5869 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cba8f000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5870 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec801d84 r8:00000002 r7:60000113 r6:ec801d8c r5:856c1800 r4:856c1800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c1800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a978c r4:857a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a978c r4:854b5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c1800 r8:854b5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5c80 r8:80287e08 r7:ec7fde60 r6:854f2600 r5:856c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4980 INFO: task kworker/0:566:5870 is blocked on a mutex likely owned by task kworker/0:86:3596. 9d60: 80230ad0 80239bb0 800d0113 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:567:5872 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:5872 tgid:5872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec809d84 r8:00000002 r7:60000113 r6:ec809d8c r5:856c2400 r4:856c2400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c2400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec809e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857a9b8c r4:857a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857a9b8c r4:854b5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c2400 r8:854b5d2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec809fb0 to 0xec809ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f4ac0 INFO: task kworker/0:567:5872 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cbf21000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0029fb0 to 0xe0029ff8) task:kworker/0:568 state:D stack:0 pid:5874 tgid:5874 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857a9f8c r4:857a9c00 r7:dddced80 r6:83018000 r5:857a9f8c r4:854b5c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e0029dc0 r5:84aebb8c r4:84aeb800 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:5876 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec819d84 r8:00000002 r7:60000113 r6:ec819d8c r5:856c4800 r4:856c4800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c4800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f4f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857aa38c r4:857aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aa38c r4:854b5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c4800 r8:854b5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5d80 r8:80287e08 r7:ec7fde60 r6:854f2780 r5:856c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84aebb8c r4:84aeb800 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:5878 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:5878 tgid:5878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec821d84 r8:00000002 r7:60000013 r6:ec821d8c r5:856c5400 r4:856c5400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c5400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857aa78c r4:857aa400 r10:61c88647 r9:856c5400 r8:854b5eac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec829e08 r5:857aab8c r4:857aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857aab8c r4:854b5f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6000 r8:854b5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5f00 r8:80287e08 r7:ec7fde60 r6:854f2880 r5:856c6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec829fb0 to 0xec829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d280 INFO: task kworker/0:571:5880 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857aaf8c r4:857aac00 r7:dddced80 r6:83018000 r5:857aaf8c r4:8567e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ec839d84 r8:00000002 r7:60000013 r6:ec839d8c r5:85711800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:dfe13000 r4:00000001 r4:8462f100 Call trace: r4:00000000 r9:83018005 r8:85712400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r4:8567e200 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:5888 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:5888 tgid:5888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:85713000 r4:85713000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713000 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8582878c r4:85828400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582878c r4:8567e100 r4:8567e100 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849a8000 Exception stack(0xe0029fb0 to 0xe0029ff8) INFO: task kworker/0:576:5890 blocked for more than 478 seconds. r5:85713c00 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8582838c r4:8567e280 r10:00000000 r9:8567e280 r8:80287e08 r7:ec841e60 r6:854f2b00 r5:85713c00 task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad0 80239bb0 800d0113 ffffffff r4:e0029dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5894 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d1d84 r8:00000002 r7:60000113 r6:ec7d1d8c r5:85714800 r4:85714800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85714800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b61c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570038c r4:85700000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570038c r4:854f2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85714800 r8:854f2bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2b80 r8:80287e08 r7:ec7cde60 r6:854f2d00 r5:85714800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6180 INFO: task kworker/1:798:5894 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cd3ae000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:5896 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec84dd84 r8:00000002 r7:60000113 r6:ec84dd8c r5:85716000 r4:85716000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec84de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec605000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85828f8c r4:85828c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85828f8c r4:8567e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716000 r8:8567e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e300 r8:80287e08 r7:ec841e60 r6:854f2c00 r5:85716000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567db40 INFO: task kworker/0:577:5896 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cd762000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:5897 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:5897 tgid:5897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85716c00 r4:85716c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85716c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dcc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85828b8c r4:85828800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85828b8c r4:8567e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716c00 r8:8567e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e180 r8:80287e08 r7:ec84de60 r6:854f2c80 r5:85716c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec851fb0 to 0xec851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567db40 INFO: task kworker/0:578:5897 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cda44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:5900 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:5900 tgid:5900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:85041800 r4:85041800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec63b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85829b8c r4:85829800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85829b8c r4:8567e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85041800 r8:8567e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e380 r8:80287e08 r7:ec84de60 r6:8567e480 r5:85041800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567dd80 INFO: task kworker/0:579:5900 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cda44000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5901 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5901 tgid:5901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:85710000 r4:85710000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85710000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85700b8c r4:85700800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85700b8c r4:854f2d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85710000 r8:854f2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f2d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f2d80 r8:80287e08 r7:ec7cde60 r6:854f2e00 r5:85710000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec85dfb0 to 0xec85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6500 INFO: task kworker/1:799:5901 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cde85000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:5902 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:5902 tgid:5902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:8570a400 r4:8570a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8570a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b7ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8570a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec613000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582938c r4:85829000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582938c r4:8567e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8570a400 r8:8567e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e500 r8:80287e08 r7:ec849e60 r6:854f2e80 r5:8570a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567dd80 INFO: task kworker/0:580:5902 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cdfb0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:5904 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec869d84 r8:00000002 r7:60000013 r6:ec869d8c r5:85715400 r4:85715400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85715400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec869e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85715400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582978c r4:85829400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582978c r4:8567e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85715400 r8:8567e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e400 r8:80287e08 r7:ec849e60 r6:854f2f00 r5:85715400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b7e80 INFO: task kworker/0:581:5904 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cdfb0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:5906 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7d9d84 r8:00000002 r7:60000113 r6:ec7d9d8c r5:85044800 r4:85044800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85044800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d9e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85044800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a78c r4:8582a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582a78c r4:8567e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85044800 r8:8567e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e680 r8:80287e08 r7:ec849e60 r6:8567e600 r5:85044800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5100 INFO: task kworker/0:582:5906 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce123000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:5908 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:5908 tgid:5908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:85043000 r4:85043000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043000 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85829f8c r4:85829c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85829f8c r4:8567e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043000 r8:8567e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e700 r8:80287e08 r7:ec7d9e60 r6:8567e800 r5:85043000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5340 INFO: task kworker/0:583:5908 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce3e0000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5910 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5910 tgid:5910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec865d84 r8:00000002 r7:60000113 r6:ec865d8c r5:85045400 r4:85045400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85045400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85045400 r7:00000000 r6:83018000 r5:00001000 r4:7f011000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582a38c r4:8582a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582a38c r4:8567e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:8567e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e580 r8:80287e08 r7:ec7d9e60 r6:8567e900 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5480 INFO: task kworker/0:584:5910 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce431000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:5913 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:85046000 r4:85046000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85046000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582ab8c r4:8582a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582ab8c r4:8567e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046000 r8:8567e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e780 r8:80287e08 r7:ec7d9e60 r6:8567e980 r5:85046000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b54c0 INFO: task kworker/0:585:5913 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce5f3000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:5915 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7c5d84 r8:00000002 r7:60000013 r6:ec7c5d8c r5:85046c00 r4:85046c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85046c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb991000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b78c r4:8582b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b78c r4:8567ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:8567ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ea00 r8:80287e08 r7:ec6e5e60 r6:8567eb00 r5:85046c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c5fb0 to 0xec7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5580 INFO: task kworker/0:586:5915 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce729000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:5917 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:85043c00 r4:85043c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b57c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582af8c r4:8582ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582af8c r4:8567e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043c00 r8:8567e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567e880 r8:80287e08 r7:ec7c5e60 r6:8567ea80 r5:85043c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec86dfb0 to 0xec86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5780 INFO: task kworker/0:587:5917 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce9ba000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:5918 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:5918 tgid:5918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec701d84 r8:00000002 r7:60000113 r6:ec701d8c r5:85042400 r4:85042400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85042400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85042400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b38c r4:8582b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b38c r4:8567eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:8567ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567eb80 r8:80287e08 r7:ec7c5e60 r6:8567ec00 r5:85042400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5780 INFO: task kworker/0:588:5918 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ce9ba000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:5921 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec879d84 r8:00000002 r7:60000113 r6:ec879d8c r5:85058c00 r4:85058c00 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058c00 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b5f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bb8c r4:8582b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bb8c r4:8567ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058c00 r8:8567edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ed80 r8:80287e08 r7:ec7c5e60 r6:8567ee00 r5:85058c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b5d00 INFO: task kworker/0:589:5921 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: ceb43000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:ec871d84 r8:00000002 r7:60000113 r6:ec871d8c r5:85718c00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85700f8c r4:85700c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85718c00 r8:857dc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:857dc800 r8:80287e08 r7:ec7cde60 r6:85664f80 r5:85718c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b6ec0 INFO: task kworker/1:800:5924 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cedea000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:5926 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:5926 tgid:5926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec881d84 r8:00000002 r7:60000113 r6:ec881d8c r5:8571a400 r4:8571a400 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571a400 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85507040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8571a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bf8c r4:8582bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bf8c r4:8567ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571a400 r8:8567ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8567ef00 r8:80287e08 r7:ec879e60 r6:854f2f80 r5:8571a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d840 INFO: task kworker/0:590:5926 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf12c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:5928 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:8571bc00 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:8571bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:85830b8c r4:85830800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8567ec80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d840 INFO: task kworker/0:591:5928 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf12c000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:5929 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:5929 tgid:5929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec88dd84 r8:00000002 r7:60000013 r6:ec88dd8c r5:8571c800 r4:8571c800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571c800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583038c r4:85830000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854b5f80 r4:857c4080 Workqueue: events bpf_prog_free_deferred 9d20: cf216000 ed729000 00000001 80239b98 7f565000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:593 state:D stack:0 pid:5931 tgid:5931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec895d84 r8:00000002 r7:60000013 r6:ec895d8c r5:8571b000 r4:8571b000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571b000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8571b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583078c r4:85830400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583078c r4:8567ed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571b000 r8:8567ed2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8567ed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:594 state:D stack:0 pid:5934 tgid:5934 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8571d400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85830f8c r4:85830c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85830f8c r4:854b5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571d400 r8:854b5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854b5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854b5a00 r8:80287e08 r7:ec889e60 r6:857c9100 r5:8571d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4140 INFO: task kworker/0:594:5934 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cf760000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 INFO: task kworker/0:595:5936 blocked for more than 479 seconds. r5:8571e000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8583178c r4:85831400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8571e000 r8:857c702c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:596:5937 blocked for more than 479 seconds. Workqueue: events bpf_prog_free_deferred r4:85059800 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85059800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583138c r4:85831000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583138c r4:857c7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85059800 r8:857c71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7180 r8:80287e08 r7:ec8a9e60 r6:857c7080 r5:85059800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c43c0 INFO: task kworker/0:596:5937 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: cfa19000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:5939 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:5939 tgid:5939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8a5d84 r8:00000002 r7:60000013 r6:ec8a5d8c r5:85058000 r5:85058000 r4:8291a680 [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85831f8c r4:85831c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85058000 r8:857c712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857c4680 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r5:800d0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5941 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8b5d84 r8:00000002 r7:60000113 r6:ec8b5d8c r5:85718000 r4:85718000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85718000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b5e08 r4:00000000 [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57204>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85718000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec689000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85831b8c r4:85831800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85831b8c r4:857c7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:857c7200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0113 r4:80239bb0 r4:e0029dc0 r5:00001000 r4:dfe13000 r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85720c00 r4:8291a680 [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85720c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:85832b8c r4:85832800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85832b8c r4:857c7280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720c00 r8:857c72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7280 r8:80287e08 r7:ec8a5e60 r6:857c9280 r5:85720c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c1fb0 to 0xec8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4900 INFO: task kworker/0:599:5944 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: d00b9000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5945 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8c5d84 r8:00000002 r7:60000113 r6:ec8c5d8c r5:85721800 r4:85721800 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85721800 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c4b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85721800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8583238c r4:85832000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583238c r4:857c7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85721800 r8:857c742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7400 r8:80287e08 r7:ec8c1e60 r6:857c9300 r5:85721800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8c5fb0 to 0xec8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4900 INFO: task kworker/0:600:5945 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0029d28 to 0xe0029d70) 9d20: d0421000 ed729000 00000001 80239b98 7f565000 00000001 9d40: 82ac15a0 7f565000 ed729000 8280c928 82ac21c4 e0029da4 e0029da8 e0029d78 9d60: 80230ad0 80239bb0 800d0113 ffffffff r5:800d0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0029dc0 r5:e0029e08 r4:e0029dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84aebb8c r4:84aeb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84aebb8c r4:849a8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:849a802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:849a8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a8000 r8:80287e08 r7:dffcde60 r6:849a8080 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0029fb0 to 0xe0029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8462f100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:5947 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a54268>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8cdd84 r8:00000002 r7:60000013 r6:ec8cdd8c r5:85720000 r4:85720000 [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85720000 r4:8291a680 [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8583278c r4:85832400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8583278c r4:857c7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720000 r8:857c752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857c7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7500 r8:80287e08 r7:ec8c1e60 r6:857c9380 r5:85720000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857c4d00 INFO: task kworker/0:601:5947 is blocked on a mutex likely owned by task kworker/0:86:3596. task:kworker/0:86 state:R running task stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532e4>] (__schedule) from [<81a5469c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8492a400 r8:80200be4 r7:e0029d5c r6:ffffffff r5:8492a400 r4:00000000 [<81a5465c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 80230ad0 80239bb0 800d0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84859e40 r5:84aebb8c r4:84aeb800 r4:849a8000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred